Impact
The vulnerability arises when the CI4MS install route guard depends only on a volatile cache and the existence of an .env file to block post‑installation access. If the database becomes temporarily unreachable during a cache miss, the guard fails open, allowing an unauthenticated user to replace the .env file with attacker‑controlled database credentials. This leads to complete compromise of the application.
Affected Systems
Vendor ci4-cms-erp’s CI4MS product, versions earlier than 0.31.4.0, is affected. The issue persists until the guard is updated to version 0.31.4.0 or later.
Risk and Exploitability
The CVSS score of 8.1 indicates high severity. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a web request to the installer endpoint after a temporary database outage, an event that is plausible in many hosting environments. Once exploited, the attacker gains full control of the application, making this a critical risk for any production installation.
OpenCVE Enrichment
Github GHSA