CVE-2026-2199: SQL Injection in code-projects Online Reviewer System
CVE-2026-2199 is a SQL Injection vulnerability found in version 1. 0 of the code-projects Online Reviewer System, specifically in the user-delete. php file. The flaw allows remote attackers to manipulate the 'ID' parameter without authentication or user interaction, leading to potential unauthorized database access or modification. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Although no public exploits are currently observed in the wild, the exploit code has been released publicly, increasing the risk of exploitation. This vulnerability can compromise confidentiality, integrity, and availability of the affected system's data. European organizations using this software, especially those relying on version 1.
AI Analysis
Technical Summary
CVE-2026-2199 is a SQL Injection vulnerability identified in the Online Reviewer System version 1.0 developed by code-projects. The vulnerability resides in an unspecified function within the file /reviewer/system/system/admins/manage/users/user-delete.php, where the 'ID' parameter is improperly sanitized. This allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction, exploiting the system to execute arbitrary SQL commands. The vulnerability can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the database. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the public release of exploit code increases the risk of exploitation. The lack of patches or official fixes at the time of publication necessitates immediate mitigation efforts. This vulnerability is critical for organizations relying on this software for managing user reviews or administrative tasks, as it could lead to data breaches or service disruptions.
Potential Impact
For European organizations using the Online Reviewer System 1.0, this vulnerability poses a significant risk of unauthorized database access and manipulation. Exploitation could lead to leakage of sensitive user data, unauthorized deletion or modification of records, and potential disruption of review management services. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations), and result in financial losses due to remediation costs and potential fines. The remote, unauthenticated nature of the attack increases the attack surface, making it easier for threat actors to exploit the system from anywhere. Organizations in sectors relying heavily on online review systems, such as e-commerce, education, or public services, may face operational impacts and loss of customer trust. The medium severity rating suggests moderate but tangible risks that require timely attention.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include applying strict input validation and sanitization on the 'ID' parameter to prevent injection of malicious SQL code. Employing parameterized queries or prepared statements in the user-delete.php script is critical to eliminate direct SQL injection vectors. Restricting access to the vulnerable endpoint via network-level controls such as firewalls or VPNs can reduce exposure. Monitoring and logging database queries for anomalous activity can help detect exploitation attempts early. Organizations should also plan to upgrade to a patched version once available or consider alternative software solutions. Conducting regular security assessments and code reviews of web applications will help identify similar vulnerabilities proactively. Finally, educating developers on secure coding practices is essential to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2026-2199: SQL Injection in code-projects Online Reviewer System
Description
CVE-2026-2199 is a SQL Injection vulnerability found in version 1. 0 of the code-projects Online Reviewer System, specifically in the user-delete. php file. The flaw allows remote attackers to manipulate the 'ID' parameter without authentication or user interaction, leading to potential unauthorized database access or modification. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Although no public exploits are currently observed in the wild, the exploit code has been released publicly, increasing the risk of exploitation. This vulnerability can compromise confidentiality, integrity, and availability of the affected system's data. European organizations using this software, especially those relying on version 1.
AI-Powered Analysis
Technical Analysis
CVE-2026-2199 is a SQL Injection vulnerability identified in the Online Reviewer System version 1.0 developed by code-projects. The vulnerability resides in an unspecified function within the file /reviewer/system/system/admins/manage/users/user-delete.php, where the 'ID' parameter is improperly sanitized. This allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction, exploiting the system to execute arbitrary SQL commands. The vulnerability can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the database. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the public release of exploit code increases the risk of exploitation. The lack of patches or official fixes at the time of publication necessitates immediate mitigation efforts. This vulnerability is critical for organizations relying on this software for managing user reviews or administrative tasks, as it could lead to data breaches or service disruptions.
Potential Impact
For European organizations using the Online Reviewer System 1.0, this vulnerability poses a significant risk of unauthorized database access and manipulation. Exploitation could lead to leakage of sensitive user data, unauthorized deletion or modification of records, and potential disruption of review management services. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations), and result in financial losses due to remediation costs and potential fines. The remote, unauthenticated nature of the attack increases the attack surface, making it easier for threat actors to exploit the system from anywhere. Organizations in sectors relying heavily on online review systems, such as e-commerce, education, or public services, may face operational impacts and loss of customer trust. The medium severity rating suggests moderate but tangible risks that require timely attention.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include applying strict input validation and sanitization on the 'ID' parameter to prevent injection of malicious SQL code. Employing parameterized queries or prepared statements in the user-delete.php script is critical to eliminate direct SQL injection vectors. Restricting access to the vulnerable endpoint via network-level controls such as firewalls or VPNs can reduce exposure. Monitoring and logging database queries for anomalous activity can help detect exploitation attempts early. Organizations should also plan to upgrade to a patched version once available or consider alternative software solutions. Conducting regular security assessments and code reviews of web applications will help identify similar vulnerabilities proactively. Finally, educating developers on secure coding practices is essential to prevent recurrence.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-07T17:36:25.638Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698931db4b57a58fa1e6f5e3
Added to database: 2/9/2026, 1:01:15 AM
Last enriched: 2/9/2026, 1:15:32 AM
Last updated: 2/9/2026, 3:27:57 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2210: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2203: Buffer Overflow in Tenda AC8
HighCVE-2026-2202: Buffer Overflow in Tenda AC8
HighCVE-2026-2201: Cross Site Scripting in ZeroWdd studentmanager
MediumCVE-2026-2200: Cross Site Scripting in heyewei JFinalCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.