Description
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within System Settings – Company Information. Several administrative configuration fields accept attacker-controlled input that is stored server-side and later rendered without proper output encoding. This issue has been patched in version 0.31.0.0.
Published: 2026-04-01
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch Immediately
AI Analysis

Impact

CI4MS contains a stored DOM XSS flaw in the System Settings – Company Information section. Attacker‑controlled input is persisted in the database and later rendered without proper encoding, allowing malicious JavaScript to execute in the context of any user who views the settings page. Because the framework supports role‑based access control, an attacker can hijack sessions for administrators or any role, effectively achieving full account takeover and privilege escalation.

Affected Systems

The affected product is CI4MS by ci4‑cms‑erp. Versions prior to 0.31.0.0 are vulnerable; the issue was fixed in the 0.31.0.0 release. All user roles that can modify system settings — including administrators, editors, and other privileged users — are at risk.

Risk and Exploitability

The CVSS score of 4.7 indicates moderate severity, while the EPSS score of less than 1% suggests a low current likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is through the web interface where an attacker with permissions to alter system settings injects malicious payloads, which are later executed when any user accesses the settings page.

Generated by OpenCVE AI on April 9, 2026 at 17:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch to version 0.31.0.0 or later

Generated by OpenCVE AI on April 9, 2026 at 17:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-v897-c6vq-6cr3 CI4MS: System Settings (Company Information) Full Platform Compromise & Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS
History

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ci4-cms-erp:ci4ms:*:*:*:*:*:*:*:*

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Ci4-cms-erp
Ci4-cms-erp ci4ms
Vendors & Products Ci4-cms-erp
Ci4-cms-erp ci4ms

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within System Settings – Company Information. Several administrative configuration fields accept attacker-controlled input that is stored server-side and later rendered without proper output encoding. This issue has been patched in version 0.31.0.0.
Title CI4MS: System Settings (Company Information) Full Platform Compromise & Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}


Subscriptions

Ci4-cms-erp Ci4ms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T19:48:14.052Z

Reserved: 2026-03-30T16:31:39.265Z

Link: CVE-2026-34562

cve-icon Vulnrichment

Updated: 2026-04-03T19:48:09.293Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T22:16:19.640

Modified: 2026-04-09T15:03:10.170

Link: CVE-2026-34562

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:45Z

Weaknesses