Description
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. From version 0.26.0 to before version 0.31.8.0, the auth filter has the deactivated/banned user check commented out. This issue has been patched in version 0.31.8.0.
Published: 2026-05-07
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

CI4MS implements role‑based access control, and the auth filter is responsible for checking whether a user account is active. In versions 0.26.0 through the 0.31.7.x releases the line that verifies the active flag was commented out. As a result, a user who had been deactivated or banned could still be granted a session and access the CMS as if they were fully active. This flaw allows an attacker to retain access after an administrative deactivation, potentially facilitating unauthorized actions or data access.

Affected Systems

ci4-cms-erp:ci4ms is the vendor and product name. The vulnerability exists in all released versions from 0.26.0 up to, but not including, 0.31.8.0. Version 0.31.8.0 contains a fix that restores the deactivated user check in the authentication filter. Any deployment of an older CI4MS release using the default auth filter is affected.

Risk and Exploitability

In the Common Vulnerability Scoring System, the CVSS base score is 5.3, indicating moderate severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been publicly exploited. The flaw can be leveraged by any adversary who can obtain or hijack a session cookie for a deactivated user; the attack requires only standard web access to the application, so the likely vector is a web session or a compromised user account. If an attacker can maintain a session for a deactivated account, they can continue to perform actions permitted to that user role, potentially leading to data disclosure or further privilege escalation within the CMS.

Generated by OpenCVE AI on May 7, 2026 at 05:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading to CI4MS 0.31.8.0 or later, which restores the deactivated user check in the authentication filter.
  • Confirm that the authentication filter is actively validating the active flag in the user account table and that the active user status is enforced in the session management logic.
  • If an immediate upgrade is not possible, add an explicit check in your CI4MS code that rejects any session where the user’s active flag is zero, or revoke session tokens for deactivated accounts to enforce the restriction.

Generated by OpenCVE AI on May 7, 2026 at 05:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5hfv-c864-qcq9 CI4MS has a Deactivated User Session Bypass (active=0)
History

Thu, 07 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 May 2026 07:00:00 +0000

Type Values Removed Values Added
First Time appeared Ci4-cms-erp
Ci4-cms-erp ci4ms
Vendors & Products Ci4-cms-erp
Ci4-cms-erp ci4ms

Thu, 07 May 2026 04:15:00 +0000

Type Values Removed Values Added
Description CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. From version 0.26.0 to before version 0.31.8.0, the auth filter has the deactivated/banned user check commented out. This issue has been patched in version 0.31.8.0.
Title CI4MS: Deactivated User Session Bypass (active=0)
Weaknesses CWE-613
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Ci4-cms-erp Ci4ms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-07T12:47:44.069Z

Reserved: 2026-04-22T15:11:54.671Z

Link: CVE-2026-41891

cve-icon Vulnrichment

Updated: 2026-05-07T12:47:36.798Z

cve-icon NVD

Status : Received

Published: 2026-05-07T04:16:33.903

Modified: 2026-05-07T04:16:33.903

Link: CVE-2026-41891

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T06:45:15Z

Weaknesses