Home

Description

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 31.0.0.0, the application fails to properly sanitize user-controlled input when users update their profile name (e.g., full name / username). An attacker can inject a malicious JavaScript payload into their profile name, which is then stored server-side. This stored payload is later rendered unsafely in multiple application views without proper output encoding, leading to stored cross-site scripting (XSS). This vulnerability is fixed in 31.0.0.0.

PUBLISHED Reserved 2026-03-31 | Published 2026-04-06 | Updated 2026-04-07 | Assigner GitHub_M




CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 31.0.0.0
affected

References

github.com/.../ci4ms/security/advisories/GHSA-vr2g-rhm5-q4jr exploit

github.com/.../ci4ms/security/advisories/GHSA-vr2g-rhm5-q4jr

cve.org (CVE-2026-34989)

nvd.nist.gov (CVE-2026-34989)

Download JSON