Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25510: CWE-434: Unrestricted Upload of File with Dangerous Type in ci4-cms-erp ci4ms

0
Critical
VulnerabilityCVE-2026-25510cvecve-2026-25510cwe-434cwe-94
Published: Tue Feb 03 2026 (02/03/2026, 21:17:02 UTC)
Source: CVE Database V5
Vendor/Project: ci4-cms-erp
Product: ci4ms

Description

CVE-2026-25510 is a critical remote code execution vulnerability in ci4ms, a CodeIgniter 4-based CMS. Authenticated users with file editor permissions can upload and execute arbitrary PHP code via file creation and save endpoints in versions prior to 0. 28. 5. 0. This vulnerability arises from unrestricted file upload of dangerous types (CWE-434) combined with code injection (CWE-94). Exploitation requires authentication but no user interaction beyond that. The vulnerability has a CVSS score of 10. 0, indicating critical severity with full impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the risk is high due to ease of exploitation and potential for full system compromise.

AI-Powered Analysis

AILast updated: 02/03/2026, 21:44:29 UTC

Technical Analysis

CVE-2026-25510 affects ci4ms, a CMS built on the CodeIgniter 4 framework, specifically versions prior to 0.28.5.0. The vulnerability stems from improper validation and restriction on file uploads, allowing authenticated users with file editor permissions to upload files containing malicious PHP code. This is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-94 (Improper Control of Generation of Code). By exploiting the file creation and save endpoints, an attacker can upload and execute arbitrary PHP scripts on the server, leading to remote code execution (RCE). The vulnerability requires the attacker to have authenticated access with file editor privileges, but no additional user interaction is necessary. The CVSS 3.1 base score is 10.0, reflecting the vulnerability's critical nature with network attack vector, low attack complexity, privileges required, no user interaction, and complete compromise of confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's characteristics make it highly exploitable in environments where ci4ms is deployed. The issue was addressed in version 0.28.5.0 by implementing proper file type validation and restricting executable file uploads. Organizations running affected versions should prioritize upgrading to the patched release to mitigate the risk of full system compromise.

Potential Impact

The impact of this vulnerability on European organizations can be severe. Successful exploitation allows attackers to execute arbitrary code on the web server hosting ci4ms, potentially leading to full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks within the network. Confidentiality is at risk as attackers can access sensitive data stored or processed by the CMS. Integrity is compromised since attackers can modify or inject malicious content or code. Availability is also threatened due to potential denial-of-service conditions caused by malicious payloads or system instability. Given ci4ms is a CMS, it may be used by various organizations including SMEs, public sector entities, and enterprises for content management and ERP integration. The risk is heightened in sectors with sensitive data or critical operations, such as finance, healthcare, and government. The requirement for authenticated access somewhat limits exposure but does not eliminate risk, especially if credential theft or insider threats are possible. European organizations relying on ci4ms without timely patching face a critical security risk that could lead to significant operational disruption and regulatory consequences under GDPR if personal data is compromised.

Mitigation Recommendations

1. Immediately upgrade ci4ms installations to version 0.28.5.0 or later, where the vulnerability is patched. 2. Restrict file editor permissions strictly to trusted users and review existing user roles to minimize the number of users with such privileges. 3. Implement additional file upload validation at the web server or application firewall level to block executable file types, particularly PHP scripts. 4. Employ web application firewalls (WAFs) with rules designed to detect and block attempts to upload or execute unauthorized code. 5. Monitor logs for suspicious file upload activity or unusual execution patterns indicative of exploitation attempts. 6. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce risk of credential compromise. 7. Conduct regular security audits and penetration testing focused on file upload functionality. 8. Isolate the CMS environment using containerization or network segmentation to limit lateral movement if compromise occurs. 9. Backup critical data regularly and verify restoration procedures to ensure resilience against potential attacks. 10. Educate administrators and developers about secure file handling practices and the risks of unrestricted file uploads.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T18:21:42.486Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698268e3f9fa50a62fe1ecce

Added to database: 2/3/2026, 9:30:11 PM

Last enriched: 2/3/2026, 9:44:29 PM

Last updated: 2/3/2026, 10:36:20 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats