CVE-2026-34566
Received Received - Intake
Stored DOM XSS in CI4MS Page Management Before

Publication date: 2026-04-01

Last updated on: 2026-04-06

Assigner: GitHub, Inc.

Description
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within the Page Management functionality when creating or editing pages. Multiple input fields accept attacker-controlled JavaScript payloads that are stored server-side. These stored values are later rendered without proper output encoding across administrative page lists and public-facing page views, leading to stored DOM-based cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-06
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ci4-cms-erp ci4ms to 0.31.0.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in CI4MS, a CodeIgniter 4-based CMS skeleton, occurs because the application does not properly sanitize user-controlled input in its Page Management functionality before version 0.31.0.0.

Attackers can inject malicious JavaScript payloads into multiple input fields when creating or editing pages. These payloads are stored on the server and later rendered without proper output encoding in both administrative page lists and public-facing page views.

This leads to stored DOM-based cross-site scripting (XSS), allowing attackers to execute arbitrary scripts in the context of users viewing the affected pages.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including unauthorized script execution in users' browsers, which can lead to session hijacking, defacement, or redirection to malicious sites.

Because the vulnerability affects both administrative and public-facing pages, attackers could compromise administrative accounts or affect site visitors.

The CVSS score of 9.1 indicates a high severity with potential impacts on confidentiality, integrity, and availability.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is caused by improper sanitization of user-controlled input in the Page Management functionality of CI4MS versions prior to 0.31.0.0, leading to stored DOM-based cross-site scripting (XSS).

To mitigate this vulnerability immediately, upgrade the CI4MS application to version 0.31.0.0 or later, where the issue has been patched.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability involves stored DOM-based cross-site scripting (XSS) due to improper sanitization of user input in the Page Management functionality. Such vulnerabilities can lead to unauthorized access or manipulation of data, which may impact the confidentiality and integrity of sensitive information.

This can affect compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and attacks. Failure to properly sanitize inputs and prevent XSS could result in data breaches or unauthorized data exposure, potentially leading to non-compliance with these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart