CVE-2026-27599
Received Received - Intake
Stored Cross-Site Scripting in CI4MS Mail Settings Configuration

Publication date: 2026-03-30

Last updated on: 2026-04-06

Assigner: GitHub, Inc.

Description
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within System Settings – Mail Settings. Several configuration fields, including Mail Server, Mail Port, Email Address, Email Password, Mail Protocol, and TLS settings, accept attacker-controlled input that is stored server-side and later rendered without proper output encoding. This issue has been patched in version 0.31.0.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-30
Last Modified
2026-04-06
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ci4-cms-erp ci4ms to 0.31.0.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in CI4MS, a CodeIgniter 4-based CMS skeleton, prior to version 0.31.0.0. The issue is that the application does not properly sanitize user-controlled input within the System Settings – Mail Settings section. Several configuration fields such as Mail Server, Mail Port, Email Address, Email Password, Mail Protocol, and TLS settings accept input from attackers that is stored on the server and later rendered without proper output encoding.


How can this vulnerability impact me? :

Because attacker-controlled input is stored and rendered without proper encoding, this vulnerability can lead to information disclosure and potentially allow attackers to inject malicious content or manipulate mail configuration settings. The CVSS score indicates a low to medium severity with impacts on confidentiality, integrity, and availability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade CI4MS to version 0.31.0.0 or later, where the issue has been patched.

Additionally, review and sanitize any user-controlled input in the System Settings – Mail Settings, especially fields like Mail Server, Mail Port, Email Address, Email Password, Mail Protocol, and TLS settings to ensure proper output encoding.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability involves improper sanitization of user-controlled input in mail configuration settings, which can lead to stored data being rendered without proper output encoding. This could potentially expose sensitive information or allow injection attacks.

However, there is no specific information provided about how this vulnerability directly impacts compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart