Vulnerability Description
A vulnerability was detected in code-projects Online Reviewer System 1.0. This affects an unknown part of the file /system/system/admins/manage/users/btn_functions.php. The manipulation of the argument firstname results in cross site scripting. It is possible to launch the attack remotely. The exploit is now public and may be used.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fabian | Online Reviewer System | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/tiancesec/CVE/issues/23ExploitIssue Tracking
- https://vuldb.com/?ctiid.344941Permissions RequiredVDB Entry
- https://vuldb.com/?id.344941Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.750028Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-2224?
CVE-2026-2224 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability was detected in code-projects Online Reviewer System 1.0. This affects an unknown part of the file /system/system/admins/manage/users/btn_functions.php. The manipulation of the argumen...
How severe is CVE-2026-2224?
CVE-2026-2224 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2224?
Check the references section above for vendor advisories and patch information. Affected products include: Fabian Online Reviewer System.