Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2220: SQL Injection in code-projects Online Reviewer System

0
Medium
VulnerabilityCVE-2026-2220cvecve-2026-2220
Published: Mon Feb 09 2026 (02/09/2026, 06:32:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Reviewer System

Description

CVE-2026-2220 is a medium severity SQL injection vulnerability found in version 1. 0 of the code-projects Online Reviewer System. The flaw exists in the /system/system/admins/assessments/pretest/btn_functions. php file, where manipulation of the difficulty_id parameter allows remote attackers to inject SQL commands. No authentication or user interaction is required to exploit this vulnerability, and the exploit code is publicly available. Although no known exploits in the wild have been reported yet, the vulnerability poses a risk to confidentiality, integrity, and availability of affected systems. European organizations using this product should prioritize patching or mitigating this issue to prevent potential data breaches or system compromise. Countries with higher adoption of this software or with strategic targets in education or assessment sectors are more likely to be affected. Practical mitigations include input validation, use of prepared statements, and network-level restrictions. Given the CVSS 4.

AI-Powered Analysis

AILast updated: 02/09/2026, 07:01:14 UTC

Technical Analysis

CVE-2026-2220 is a SQL injection vulnerability identified in the Online Reviewer System version 1.0 developed by code-projects. The vulnerability resides in the PHP file located at /system/system/admins/assessments/pretest/btn_functions.php, specifically involving the difficulty_id parameter. This parameter is improperly sanitized, allowing an attacker to inject arbitrary SQL commands remotely without authentication or user interaction. The injection can lead to unauthorized data access, modification, or deletion within the underlying database, potentially compromising the confidentiality, integrity, and availability of the system. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The exploit code is publicly available, increasing the risk of exploitation despite no current reports of active attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The attack vector is network-based with low attack complexity and no privileges required, making it accessible to a wide range of attackers. The lack of scope change means the impact is confined to the vulnerable component but still significant given the nature of SQL injection. This vulnerability is critical for organizations relying on the Online Reviewer System for managing assessments and reviews, as it could lead to data breaches or system disruptions.

Potential Impact

For European organizations, exploitation of CVE-2026-2220 could result in unauthorized access to sensitive assessment data, manipulation or deletion of records, and potential disruption of review processes. This could undermine the integrity of academic or professional evaluations, damage organizational reputation, and lead to compliance violations under data protection regulations such as GDPR. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in institutions or companies using the affected software version. Data confidentiality is at risk due to possible extraction of sensitive information, while data integrity and availability may be compromised through unauthorized modifications or denial of service. The medium severity rating reflects a balance between the potential impact and the current lack of known active exploitation, but the availability of public exploit code heightens urgency for mitigation. Organizations in sectors such as education, certification bodies, and HR departments using this system are particularly vulnerable. Failure to address this vulnerability could lead to financial losses, legal consequences, and operational disruptions.

Mitigation Recommendations

European organizations should immediately assess their use of the code-projects Online Reviewer System version 1.0 and prioritize remediation. Since no official patches are currently linked, implement the following mitigations: 1) Apply strict input validation and sanitization on the difficulty_id parameter to block malicious SQL payloads. 2) Refactor database queries to use parameterized prepared statements or stored procedures to prevent injection. 3) Restrict network access to the vulnerable application components using firewalls or VPNs to limit exposure. 4) Monitor logs for suspicious SQL query patterns or unusual access attempts targeting the difficulty_id parameter. 5) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts. 6) If feasible, upgrade to a newer, patched version of the software once available or consider alternative solutions. 7) Conduct security awareness training for administrators managing the system to recognize exploitation signs. 8) Regularly back up data and test restoration procedures to mitigate damage from potential attacks. These targeted actions go beyond generic advice and address the specific vulnerability vector and environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-08T15:59:57.194Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698982b74b57a58fa12ef2ba

Added to database: 2/9/2026, 6:46:15 AM

Last enriched: 2/9/2026, 7:01:14 AM

Last updated: 2/9/2026, 7:51:02 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats