Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2222: Cross Site Scripting in code-projects Online Reviewer System

0
Medium
VulnerabilityCVE-2026-2222cvecve-2026-2222
Published: Mon Feb 09 2026 (02/09/2026, 07:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Reviewer System

Description

CVE-2026-2222 is a medium severity cross-site scripting (XSS) vulnerability affecting version 1. 0 of the code-projects Online Reviewer System. The flaw exists in the /system/system/admins/manage/users/btn_functions. php file, where manipulation of the 'firstname' argument can lead to XSS attacks. This vulnerability can be exploited remotely without authentication but requires user interaction. While no known exploits are currently active in the wild, the exploit code has been publicly disclosed. The vulnerability impacts the confidentiality and integrity of user sessions by enabling script injection, potentially leading to session hijacking or phishing. European organizations using this product, especially those with public-facing administrative interfaces, are at risk. Mitigation involves input validation and sanitization of user-supplied data, restricting access to administrative functions, and monitoring for suspicious activity. Countries with higher adoption of this software or with strategic targets in education, research, or review platforms may be more affected.

AI-Powered Analysis

AILast updated: 02/09/2026, 08:01:28 UTC

Technical Analysis

CVE-2026-2222 is a cross-site scripting vulnerability identified in version 1.0 of the code-projects Online Reviewer System, specifically within the /system/system/admins/manage/users/btn_functions.php file. The vulnerability arises from improper handling of the 'firstname' parameter, which can be manipulated by an attacker to inject malicious scripts. This injection occurs because the application fails to adequately sanitize or encode user input before rendering it in the web interface, allowing execution of arbitrary JavaScript in the context of the victim's browser. The attack vector is remote and does not require authentication, but it does require user interaction, such as clicking a crafted link or visiting a malicious page that triggers the payload. The CVSS 4.0 vector indicates low complexity (AC:L), no privileges required (PR:H but likely a typo or misinterpretation; the original states PR:H which means high privileges required, but the description says no authentication required - this discrepancy suggests some ambiguity), and user interaction is needed (UI:P). The impact primarily affects confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized actions performed on behalf of the user. Although no active exploits have been observed in the wild, the public availability of exploit code increases the risk of exploitation. The vulnerability is limited to version 1.0 of the product, and no official patches have been linked yet. The Online Reviewer System is typically used in environments where user-generated content and administrative user management are common, making this vulnerability particularly relevant for organizations relying on this software for review or feedback collection.

Potential Impact

For European organizations, exploitation of this XSS vulnerability could lead to unauthorized access to user sessions, theft of sensitive information, and potential compromise of administrative accounts if targeted users have elevated privileges. This can result in reputational damage, data breaches, and disruption of review or feedback processes. Organizations in sectors such as education, research, and public administration that utilize the Online Reviewer System may face increased risk due to the nature of their data and the public-facing nature of their platforms. The vulnerability could also be leveraged as a stepping stone for further attacks within the network if administrative credentials are compromised. Given the medium severity, the impact is moderate but could escalate if combined with other vulnerabilities or social engineering tactics. The lack of authentication requirement for the attack vector broadens the potential attacker base, increasing exposure. However, the need for user interaction somewhat limits automated exploitation at scale.

Mitigation Recommendations

To mitigate CVE-2026-2222, organizations should implement strict input validation and output encoding on the 'firstname' parameter and any other user-supplied inputs within the Online Reviewer System. Employing Content Security Policy (CSP) headers can help reduce the impact of injected scripts. Restrict access to the administrative interface by IP whitelisting or VPN access to minimize exposure to untrusted networks. Monitor web application logs for suspicious input patterns or repeated attempts to exploit the vulnerability. Since no official patch is currently available, consider applying virtual patching via web application firewalls (WAFs) configured to detect and block malicious payloads targeting the vulnerable parameter. Educate users, especially administrators, about the risks of clicking unknown links or interacting with untrusted content. Regularly review and update the software to newer versions once patches are released. Additionally, conduct security assessments and penetration tests focusing on input validation and XSS vulnerabilities within the application environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-08T16:00:20.429Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698990c74b57a58fa133ba92

Added to database: 2/9/2026, 7:46:15 AM

Last enriched: 2/9/2026, 8:01:28 AM

Last updated: 2/9/2026, 9:42:40 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats