Description
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when creating or editing blog posts. An attacker can inject a malicious JavaScript payload into blog post content, which is then stored server-side. This stored payload is later rendered unsafely in multiple application views without proper output encoding, leading to stored cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.
Published: 2026-04-01
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS allowing account takeover
Action: Immediate Patch
AI Analysis

Impact

CI4MS is a CodeIgniter 4-based CMS skeleton that inaccurately sanitizes user input when creating or editing blog posts. A malicious user can insert a JavaScript payload into the post body, which is stored in the database and later rendered in multiple application views without proper output encoding. When a visitor opens the compromised post, the script runs in the victim’s browser, enabling the attacker to steal the session cookie and impersonate that user. This effectively grants the attacker the full privileges of the victim, leading to a complete account takeover and privilege escalation across all roles.

Affected Systems

Vulnerable instances are those running ci4cms‑erp’s CI4MS CMS before version 0.31.0.0. The flaw was addressed in the 0.31.0.0 release; deployments at that version or newer are no longer susceptible.

Risk and Exploitability

The CVSS v3.1 score of 9.1 classifies the flaw as Critical. EPSS indicates a likelihood of exploitation of less than 1 percent, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that creating or editing a blog post requires an authenticated user with permission to perform those actions, which is likely restricted to trusted roles. The attack vector is web‑based and involves inserting malicious JavaScript into a blog post; once stored, any user who views the post is exposed to the payload, allowing session hijacking and full privilege escalation.

Generated by OpenCVE AI on April 6, 2026 at 21:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade CI4MS to version 0.31.0.0 or newer.
  • If upgrading is not immediately possible, remove any script tags or malicious content from existing blog posts and enforce proper output encoding for all rendered HTML.
  • Restrict creation and editing permissions to trusted roles and monitor published content for suspicious script usage until the patch is applied.

Generated by OpenCVE AI on April 6, 2026 at 21:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x7wh-g25g-53vg CI4MS: Blogs Posts Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS
History

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ci4-cms-erp:ci4ms:*:*:*:*:*:*:*:*

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Ci4-cms-erp
Ci4-cms-erp ci4ms
Vendors & Products Ci4-cms-erp
Ci4-cms-erp ci4ms

Thu, 02 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when creating or editing blog posts. An attacker can inject a malicious JavaScript payload into blog post content, which is then stored server-side. This stored payload is later rendered unsafely in multiple application views without proper output encoding, leading to stored cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.
Title CI4MS: Blogs Posts Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L'}


Subscriptions

Ci4-cms-erp Ci4ms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T13:51:49.965Z

Reserved: 2026-03-30T16:56:30.998Z

Link: CVE-2026-34568

cve-icon Vulnrichment

Updated: 2026-04-02T13:51:41.255Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T22:16:20.570

Modified: 2026-04-06T16:49:31.050

Link: CVE-2026-34568

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:56:31Z

Weaknesses