Home

Description

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.2.0, the application fails to properly sanitize user-controlled input within System Settings – Company Information. Several administrative configuration fields accept attacker-controlled input that is stored server-side and later rendered without proper output encoding. These values are persisted in the database and rendered unsafely on public-facing pages only, such as the main landing page. There is no execution in the administrative dashboard—the vulnerability only impacts the public frontend. This vulnerability is fixed in 0.31.2.0.

PUBLISHED Reserved 2026-03-31 | Published 2026-04-06 | Updated 2026-04-08 | Assigner GitHub_M




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 0.31.2.0
affected

References

github.com/.../ci4ms/security/advisories/GHSA-5ghq-42rg-769x exploit

github.com/.../ci4ms/security/advisories/GHSA-5ghq-42rg-769x

cve.org (CVE-2026-35035)

nvd.nist.gov (CVE-2026-35035)

Download JSON