CVE-2026-2223

7.3 HIGH

📋 TL;DR

This SQL injection vulnerability in code-projects Online Reviewer System 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter in the /system/system/students/assessments/pretest/take/index.php file. Organizations using this software are affected, potentially exposing sensitive database information.

💻 Affected Systems

Products:
  • code-projects Online Reviewer System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific PHP file path mentioned; requires the system to be deployed with vulnerable code.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, authentication bypass, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized access to student assessment data, grade manipulation, and extraction of sensitive user information from the database.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or partial data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit available on GitHub; SQL injection is a well-understood attack vector with many automated tools available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. If no patch available, implement workarounds. 3. Consider replacing with alternative software.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add parameterized queries or proper input sanitization to the vulnerable PHP file.

Replace vulnerable SQL queries with prepared statements using PDO or mysqli.

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.

Configure WAF to block requests containing SQL keywords to /system/system/students/assessments/pretest/take/index.php

🧯 If You Can't Patch

  • Restrict network access to the vulnerable system using firewall rules to only allow trusted IPs.
  • Implement database-level controls: use least privilege accounts, enable logging of all database queries for anomaly detection.

🔍 How to Verify

Check if Vulnerable:

Test the vulnerable endpoint with SQL injection payloads like: /system/system/students/assessments/pretest/take/index.php?ID=1' OR '1'='1

Check Version:

Check system documentation or configuration files for version information; no standard command available.

Verify Fix Applied:

After applying fixes, test with the same payloads to ensure no SQL errors or unexpected behavior occurs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in web server logs
  • Multiple requests to the vulnerable endpoint with SQL keywords in parameters

Network Indicators:

  • HTTP requests containing SQL injection patterns (UNION, SELECT, etc.) to the specific PHP path

SIEM Query:

source="web_logs" AND uri="/system/system/students/assessments/pretest/take/index.php" AND (query="*UNION*" OR query="*SELECT*" OR query="*OR '1'='1*")

🔗 References

📤 Share & Export