Impact
The flaw arises when the CMS accepts user‑controlled profile names without proper sanitization, allowing an attacker to inject JavaScript into the name field. This malicious script is stored server‑side and later rendered unsafely in multiple application views, leading to a stored cross‑site scripting vulnerability that can be used to hijack user sessions, elevate privileges, or take full control of an account.
Affected Systems
The vulnerability affects the CI4MS CMS skeleton (ci4-cms-erp:ci4ms) in all releases prior to version 31.0.0.0. Users running earlier versions are at risk.
Risk and Exploitability
With a CVSS score of 9.4 the risk is high, EPSS data is not available, and the issue is not listed in the CISA KEV catalog. The attack vector is application‑level stored XSS. Based on the description, it is inferred that an attacker must first be authenticated to modify their profile name before exploiting the vulnerability.
OpenCVE Enrichment
Github GHSA