Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2199: SQL Injection in code-projects Online Reviewer System

0
Medium
VulnerabilityCVE-2026-2199cvecve-2026-2199
Published: Mon Feb 09 2026 (02/09/2026, 00:32:09 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Reviewer System

Description

CVE-2026-2199 is a SQL Injection vulnerability found in version 1. 0 of the code-projects Online Reviewer System, specifically in the user-delete. php file. The flaw allows remote attackers to manipulate the 'ID' parameter without authentication or user interaction, leading to potential unauthorized database access or modification. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Although no public exploits are currently observed in the wild, the exploit code has been released publicly, increasing the risk of exploitation. This vulnerability can compromise confidentiality, integrity, and availability of the affected system's data. European organizations using this software, especially those relying on version 1.

AI-Powered Analysis

AILast updated: 02/09/2026, 01:15:32 UTC

Technical Analysis

CVE-2026-2199 is a SQL Injection vulnerability identified in the Online Reviewer System version 1.0 developed by code-projects. The vulnerability resides in an unspecified function within the file /reviewer/system/system/admins/manage/users/user-delete.php, where the 'ID' parameter is improperly sanitized. This allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction, exploiting the system to execute arbitrary SQL commands. The vulnerability can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the database. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the public release of exploit code increases the risk of exploitation. The lack of patches or official fixes at the time of publication necessitates immediate mitigation efforts. This vulnerability is critical for organizations relying on this software for managing user reviews or administrative tasks, as it could lead to data breaches or service disruptions.

Potential Impact

For European organizations using the Online Reviewer System 1.0, this vulnerability poses a significant risk of unauthorized database access and manipulation. Exploitation could lead to leakage of sensitive user data, unauthorized deletion or modification of records, and potential disruption of review management services. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations), and result in financial losses due to remediation costs and potential fines. The remote, unauthenticated nature of the attack increases the attack surface, making it easier for threat actors to exploit the system from anywhere. Organizations in sectors relying heavily on online review systems, such as e-commerce, education, or public services, may face operational impacts and loss of customer trust. The medium severity rating suggests moderate but tangible risks that require timely attention.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include applying strict input validation and sanitization on the 'ID' parameter to prevent injection of malicious SQL code. Employing parameterized queries or prepared statements in the user-delete.php script is critical to eliminate direct SQL injection vectors. Restricting access to the vulnerable endpoint via network-level controls such as firewalls or VPNs can reduce exposure. Monitoring and logging database queries for anomalous activity can help detect exploitation attempts early. Organizations should also plan to upgrade to a patched version once available or consider alternative software solutions. Conducting regular security assessments and code reviews of web applications will help identify similar vulnerabilities proactively. Finally, educating developers on secure coding practices is essential to prevent recurrence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T17:36:25.638Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698931db4b57a58fa1e6f5e3

Added to database: 2/9/2026, 1:01:15 AM

Last enriched: 2/9/2026, 1:15:32 AM

Last updated: 2/9/2026, 3:27:57 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats