CVE-2026-2222

2.4 LOW

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into the Online Reviewer System 1.0 through the firstname parameter. When exploited, it enables cross-site scripting attacks that can steal user sessions or deface the application. Only users of code-projects Online Reviewer System 1.0 are affected.

💻 Affected Systems

Products:
  • code-projects Online Reviewer System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over the entire system, and use it as a platform for further attacks against users.

🟠

Likely Case

Attackers will steal user session cookies to impersonate legitimate users, potentially accessing sensitive review data or performing unauthorized actions.

🟢

If Mitigated

With proper input validation and output encoding, the attack would fail to execute malicious scripts, limiting impact to harmless payload display.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit is publicly available and requires minimal technical skill to execute against vulnerable systems.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider implementing input validation and output encoding in /system/system/admins/manage/users/btn_functions.php.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to sanitize the firstname parameter before processing

Edit btn_functions.php to include: $firstname = htmlspecialchars($_POST['firstname'], ENT_QUOTES, 'UTF-8');

WAF Rule Implementation

all

Deploy web application firewall rules to block XSS payloads in the firstname parameter

Add WAF rule: Detect and block patterns like <script>, javascript:, onload=, etc. in firstname parameter

🧯 If You Can't Patch

  • Isolate the vulnerable system behind a reverse proxy with XSS filtering capabilities
  • Implement Content Security Policy headers to restrict script execution sources

🔍 How to Verify

Check if Vulnerable:

Test by submitting a payload like <script>alert('XSS')</script> in the firstname field and check if it executes

Check Version:

Check system documentation or configuration files for version information

Verify Fix Applied:

After implementing fixes, test with the same payload to ensure it's properly sanitized and doesn't execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual characters in firstname parameter logs
  • Multiple failed login attempts following XSS payload submissions

Network Indicators:

  • HTTP requests containing script tags or JavaScript code in firstname parameter

SIEM Query:

source="web_logs" AND (firstname CONTAINS "<script>" OR firstname CONTAINS "javascript:" OR firstname CONTAINS "onload=")

🔗 References

📤 Share & Export