Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25509: CWE-204: Observable Response Discrepancy in ci4-cms-erp ci4ms

0
Medium
VulnerabilityCVE-2026-25509cvecve-2026-25509cwe-204
Published: Tue Feb 03 2026 (02/03/2026, 21:16:29 UTC)
Source: CVE Database V5
Vendor/Project: ci4-cms-erp
Product: ci4ms

Description

CVE-2026-25509 is a medium severity vulnerability in the ci4ms CMS based on CodeIgniter 4, allowing unauthenticated attackers to enumerate registered email addresses via observable response discrepancies during the password reset process. This email enumeration flaw can aid attackers in identifying valid user accounts, facilitating targeted phishing or brute-force attacks. The vulnerability affects ci4ms versions prior to 0. 28. 5. 0 and has been patched in that release. Exploitation requires no authentication or user interaction and can be performed remotely over the network. While it does not directly impact system integrity or availability, the confidentiality of user registration data is compromised. European organizations using ci4ms should upgrade promptly to mitigate this risk. Countries with higher adoption of CodeIgniter-based CMS solutions and significant enterprise or government use of ci4ms are more likely to be affected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 12:01:36 UTC

Technical Analysis

CVE-2026-25509 identifies an email enumeration vulnerability in ci4ms, a CMS skeleton built on the CodeIgniter 4 framework. The vulnerability arises from an observable response discrepancy during the password reset workflow, where the system’s responses differ based on whether an email address is registered. This behavior allows unauthenticated attackers to confirm the existence of user accounts by analyzing subtle differences in server responses, such as timing, error messages, or response content. The vulnerability is classified under CWE-204 (Observable Response Discrepancy) and affects all ci4ms versions prior to 0.28.5.0. Since the attack vector is network-based and requires no privileges or user interaction, it is relatively easy to exploit. The impact is limited to confidentiality as it leaks user registration information but does not allow direct account compromise or system manipulation. The issue has been addressed in ci4ms version 0.28.5.0 by standardizing responses during password reset requests to prevent enumeration. No public exploits have been reported yet, but the vulnerability can facilitate further attacks such as targeted phishing, credential stuffing, or social engineering by revealing valid user emails.

Potential Impact

For European organizations, this vulnerability primarily threatens the confidentiality of user data by exposing registered email addresses. Attackers can leverage this information to craft more convincing phishing campaigns or attempt brute-force attacks on known accounts, increasing the risk of account compromise indirectly. Organizations relying on ci4ms for internal or external-facing portals may face reputational damage if user data is leaked or abused. While the vulnerability does not directly affect system integrity or availability, the reconnaissance advantage it provides can be a stepping stone for more severe attacks. Given the widespread use of CMS platforms in Europe across various sectors including government, education, and private enterprises, the potential for targeted attacks increases. Organizations with sensitive user bases or regulatory obligations under GDPR must treat this vulnerability seriously to avoid compliance issues related to unauthorized data disclosure.

Mitigation Recommendations

European organizations using ci4ms should immediately upgrade to version 0.28.5.0 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement application-layer mitigations such as uniform response messages and timing controls during password reset requests to eliminate observable discrepancies. Employ rate limiting and CAPTCHA challenges on password reset endpoints to hinder automated enumeration attempts. Monitor logs for abnormal password reset request patterns that may indicate enumeration activity. Additionally, educate users about phishing risks and encourage strong, unique passwords combined with multi-factor authentication (MFA) to reduce the impact of potential account enumeration. Regularly audit and update CMS components and dependencies to ensure timely application of security patches. Finally, consider implementing Web Application Firewalls (WAFs) with rules designed to detect and block enumeration behaviors specific to ci4ms password reset flows.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T18:21:42.486Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698268e3f9fa50a62fe1ecca

Added to database: 2/3/2026, 9:30:11 PM

Last enriched: 2/11/2026, 12:01:36 PM

Last updated: 3/21/2026, 6:30:48 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses