CVE-2026-34561
Received Received - Intake
Stored Cross-Site Scripting in CI4MS Social Media Settings

Publication date: 2026-04-01

Last updated on: 2026-04-13

Assigner: GitHub, Inc.

Description
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within System Settings – Social Media Management. Multiple configuration fields, including Social Media and Social Media Link, accept attacker-controlled input that is stored server-side and later rendered without proper output encoding. This issue has been patched in version 0.31.0.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ci4-cms-erp ci4ms to 0.31.0.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed in CI4MS version 0.31.0.0. Immediate mitigation involves upgrading the application to version 0.31.0.0 or later.

This update addresses improper sanitization of user-controlled input within System Settings – Social Media Management, preventing stored cross-site scripting attacks.


Can you explain this vulnerability to me?

The vulnerability exists in CI4MS, a CodeIgniter 4-based CMS skeleton, prior to version 0.31.0.0. The application fails to properly sanitize user-controlled input within the System Settings – Social Media Management section. Multiple configuration fields, including Social Media and Social Media Link, accept input from attackers that is stored on the server and later rendered without proper output encoding.


How can this vulnerability impact me? :

Because the application stores and renders attacker-controlled input without proper output encoding, this vulnerability can lead to security issues such as cross-site scripting (XSS). This can allow attackers to execute malicious scripts in the context of the affected application, potentially leading to information disclosure, data manipulation, or other impacts on confidentiality, integrity, and availability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability involves improper sanitization of user-controlled input that is stored server-side and later rendered without proper output encoding. This can lead to potential data integrity and confidentiality issues.

Such issues may impact compliance with standards like GDPR and HIPAA, which require protection of personal data and secure handling of user input to prevent unauthorized access or data leakage.

However, specific impacts on compliance are not detailed in the provided information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart