CVE-2026-2223: SQL Injection in code-projects Online Reviewer System
A security vulnerability has been detected in code-projects Online Reviewer System 1.0. Affected by this issue is some unknown functionality of the file /system/system/students/assessments/pretest/take/index.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2026-2223 identifies a SQL Injection vulnerability in the code-projects Online Reviewer System version 1.0, specifically within the file /system/system/students/assessments/pretest/take/index.php. The vulnerability arises from improper sanitization of the 'ID' parameter, which is directly used in SQL queries. This allows an attacker to craft malicious input to manipulate the SQL query logic, potentially extracting sensitive data, modifying database contents, or causing denial of service. The attack vector is network-based, requiring no authentication or user interaction, which increases the risk profile. The vulnerability affects confidentiality, integrity, and availability of the system's data, though the impact is somewhat limited by the scope of the affected functionality. The CVSS 4.0 vector indicates low complexity and no privileges or user interaction required, with partial impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the public disclosure means attackers may develop exploits soon. The lack of available patches necessitates immediate mitigation steps by administrators. This vulnerability is critical for organizations relying on this system for managing student assessments and pretests, as unauthorized access or data manipulation could undermine educational integrity and privacy.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for educational institutions or government agencies using the code-projects Online Reviewer System version 1.0. Exploitation could lead to unauthorized disclosure of student data, alteration of assessment results, or disruption of online testing services. This compromises data confidentiality, potentially violating GDPR and other data protection regulations, leading to legal and reputational consequences. Integrity breaches could undermine trust in educational outcomes, while availability impacts could disrupt critical assessment processes. The remote and unauthenticated nature of the attack increases the likelihood of exploitation, particularly in environments with exposed web interfaces. Organizations with limited security monitoring or outdated software management practices are at higher risk. The medium severity rating reflects a balance between the ease of exploitation and the scope of impact, but the potential regulatory and operational consequences in Europe elevate the importance of timely mitigation.
Mitigation Recommendations
1. Immediate application of any available patches or updates from the vendor; if none exist, consider upgrading to a newer, unaffected version. 2. Implement strict input validation and sanitization on all user-supplied parameters, especially the 'ID' parameter in the affected PHP file. 3. Refactor database queries to use parameterized statements or prepared queries to prevent injection. 4. Restrict database user permissions to the minimum necessary, avoiding use of high-privilege accounts for web applications. 5. Employ web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the vulnerable endpoint. 6. Conduct regular security audits and code reviews focusing on input handling and database interactions. 7. Monitor logs for suspicious activity related to the vulnerable URL or parameters. 8. Educate developers and administrators on secure coding practices and vulnerability management. 9. If immediate patching is not possible, consider isolating or restricting access to the vulnerable system to trusted networks only. 10. Prepare incident response plans to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2026-2223: SQL Injection in code-projects Online Reviewer System
Description
A security vulnerability has been detected in code-projects Online Reviewer System 1.0. Affected by this issue is some unknown functionality of the file /system/system/students/assessments/pretest/take/index.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2026-2223 identifies a SQL Injection vulnerability in the code-projects Online Reviewer System version 1.0, specifically within the file /system/system/students/assessments/pretest/take/index.php. The vulnerability arises from improper sanitization of the 'ID' parameter, which is directly used in SQL queries. This allows an attacker to craft malicious input to manipulate the SQL query logic, potentially extracting sensitive data, modifying database contents, or causing denial of service. The attack vector is network-based, requiring no authentication or user interaction, which increases the risk profile. The vulnerability affects confidentiality, integrity, and availability of the system's data, though the impact is somewhat limited by the scope of the affected functionality. The CVSS 4.0 vector indicates low complexity and no privileges or user interaction required, with partial impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the public disclosure means attackers may develop exploits soon. The lack of available patches necessitates immediate mitigation steps by administrators. This vulnerability is critical for organizations relying on this system for managing student assessments and pretests, as unauthorized access or data manipulation could undermine educational integrity and privacy.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for educational institutions or government agencies using the code-projects Online Reviewer System version 1.0. Exploitation could lead to unauthorized disclosure of student data, alteration of assessment results, or disruption of online testing services. This compromises data confidentiality, potentially violating GDPR and other data protection regulations, leading to legal and reputational consequences. Integrity breaches could undermine trust in educational outcomes, while availability impacts could disrupt critical assessment processes. The remote and unauthenticated nature of the attack increases the likelihood of exploitation, particularly in environments with exposed web interfaces. Organizations with limited security monitoring or outdated software management practices are at higher risk. The medium severity rating reflects a balance between the ease of exploitation and the scope of impact, but the potential regulatory and operational consequences in Europe elevate the importance of timely mitigation.
Mitigation Recommendations
1. Immediate application of any available patches or updates from the vendor; if none exist, consider upgrading to a newer, unaffected version. 2. Implement strict input validation and sanitization on all user-supplied parameters, especially the 'ID' parameter in the affected PHP file. 3. Refactor database queries to use parameterized statements or prepared queries to prevent injection. 4. Restrict database user permissions to the minimum necessary, avoiding use of high-privilege accounts for web applications. 5. Employ web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the vulnerable endpoint. 6. Conduct regular security audits and code reviews focusing on input handling and database interactions. 7. Monitor logs for suspicious activity related to the vulnerable URL or parameters. 8. Educate developers and administrators on secure coding practices and vulnerability management. 9. If immediate patching is not possible, consider isolating or restricting access to the vulnerable system to trusted networks only. 10. Prepare incident response plans to quickly address any exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-08T16:00:24.020Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698997e24b57a58fa1363d31
Added to database: 2/9/2026, 8:16:34 AM
Last enriched: 2/9/2026, 8:30:34 AM
Last updated: 2/9/2026, 10:50:41 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2227: Command Injection in D-Link DCS-931L
MediumCVE-2026-2226: Unrestricted Upload in DouPHP
MediumCVE-2026-23903: CWE-289 Authentication Bypass by Alternate Name in Apache Software Foundation Apache Shiro
UnknownCVE-2026-2225: SQL Injection in itsourcecode News Portal Project
MediumCVE-2026-25905: CWE-653 Improper Isolation or Compartmentalization
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.