Description
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within System Settings – Mail Settings. Several configuration fields, including Mail Server, Mail Port, Email Address, Email Password, Mail Protocol, and TLS settings, accept attacker-controlled input that is stored server-side and later rendered without proper output encoding. This issue has been patched in version 0.31.0.0.
Published: 2026-03-30
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored DOM XSS leading to full platform compromise and account takeover
Action: Patch Now
AI Analysis

Impact

This vulnerability in CI4MS allows an attacker to inject malicious JavaScript into the system’s mail configuration settings. Because the input is stored and later rendered without proper output encoding, the attack manifests as a stored DOM‑based cross‑site scripting flaw. When an affected user or administrator loads the compromised configuration page, the attacker‑controlled script executes with the privileges of that user, potentially exposing credentials, session cookies, and enabling full platform compromise or account takeover across all roles.

Affected Systems

The issue affects releases of ci4‑cms‑erp’s CI4MS CMS skeleton prior to version 0.31.0.0. All installations that have not adopted this security update are vulnerable. Vendors and developers using this CMS should verify the installed version and plan an upgrade.

Risk and Exploitability

The vulnerability is exploitable through the web‑based configuration interface. An attacker only needs to submit malicious content into the Mail Server, Mail Port, Email Address, Email Password, Mail Protocol, or TLS settings fields. Once stored, the payload is executed whenever the settings page is rendered, giving the attacker client‑side script execution that can be leveraged for session hijacking, credential theft, or privilege escalation. The CVSS score of 4.7 indicates moderate complexity, and the EPSS of less than 1% suggests low probability of exploitation. The flaw is not listed in the CISA KEV catalog, but the documented impact warrants proactive remediation.

Generated by OpenCVE AI on April 6, 2026 at 21:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official security patch by upgrading CI4MS to version 0.31.0.0 or later.
  • Verify that the Mail Settings form no longer stores raw input and that output encoding is enforced.
  • Review any custom mail configuration modules for potential unsanitized rendering.
  • Monitor authentication and session logs for suspicious activity following the update.

Generated by OpenCVE AI on April 6, 2026 at 21:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-66m2-v9v9-95c3 ci4-cms-erp/ci4ms: System Settings (Mail Settings) Full Platform Compromise & Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS
History

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ci4-cms-erp:ci4ms:*:*:*:*:*:*:*:*

Thu, 02 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Ci4-cms-erp
Ci4-cms-erp ci4ms
Vendors & Products Ci4-cms-erp
Ci4-cms-erp ci4ms

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within System Settings – Mail Settings. Several configuration fields, including Mail Server, Mail Port, Email Address, Email Password, Mail Protocol, and TLS settings, accept attacker-controlled input that is stored server-side and later rendered without proper output encoding. This issue has been patched in version 0.31.0.0.
Title CI4MS: System Settings (Mail Settings) Full Platform Compromise & Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}


Subscriptions

Ci4-cms-erp Ci4ms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T14:08:29.933Z

Reserved: 2026-02-20T19:43:14.602Z

Link: CVE-2026-27599

cve-icon Vulnrichment

Updated: 2026-04-02T14:08:26.301Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T21:17:08.573

Modified: 2026-04-06T17:42:14.267

Link: CVE-2026-27599

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T08:08:32Z

Weaknesses