CVE-2026-2166

7.3 HIGH

📋 TL;DR

This SQL injection vulnerability in code-projects Online Reviewer System 1.0 allows attackers to manipulate database queries through the login form. Remote attackers can potentially access, modify, or delete database contents. All systems running this software with the vulnerable login component are affected.

💻 Affected Systems

Products:
  • code-projects Online Reviewer System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the login component specifically at /login/index.php

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, authentication bypass, and potential remote code execution if database permissions allow.

🟠

Likely Case

Unauthorized data access, credential theft, and potential privilege escalation leading to system compromise.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available and SQL injection is a well-understood attack vector with many automated tools available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider implementing parameterized queries in /login/index.php or migrating to a supported alternative.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection rules to block malicious login attempts.

Input Validation

all

Implement strict input validation on username and password fields to reject SQL special characters.

🧯 If You Can't Patch

  • Isolate the system behind a reverse proxy with SQL injection filtering
  • Implement network segmentation to limit database access from the application server

🔍 How to Verify

Check if Vulnerable:

Test login form with SQL injection payloads like ' OR '1'='1 in username/password fields and observe database errors or unexpected behavior.

Check Version:

Check application version in source code or configuration files; no standard command available.

Verify Fix Applied:

Verify that SQL injection payloads no longer work and that login functionality remains intact with legitimate credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax in login attempts
  • Multiple failed login attempts with SQL keywords
  • Database error messages in application logs

Network Indicators:

  • HTTP POST requests to /login/index.php containing SQL keywords like UNION, SELECT, OR, --

SIEM Query:

source="web_logs" AND uri="/login/index.php" AND (request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT" OR request_body CONTAINS "' OR '")

🔗 References

📤 Share & Export