CVE-2026-34557: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ci4-cms-erp ci4ms
CI4MS versions prior to 0. 31. 0. 0 contain a stored cross-site scripting (XSS) vulnerability in the group and role management functionality. The application fails to properly sanitize user input in multiple group-related fields, allowing malicious JavaScript payloads to be stored server-side. These payloads are then rendered unsafely in privileged administrative views without proper output encoding, leading to stored XSS within the role and permission management context. This vulnerability has been patched in version 0. 31. 0. 0.
AI Analysis
Technical Summary
CI4MS, a CodeIgniter 4-based CMS skeleton, suffers from a stored cross-site scripting vulnerability (CWE-79) in versions before 0.31.0.0. The issue arises because user-controlled input in three distinct group-related fields is not properly sanitized before storage. When these malicious inputs are later rendered in administrative interfaces without appropriate output encoding, it results in stored XSS that can affect privileged users managing roles and permissions. The vulnerability has a CVSS 3.1 score of 9.1, indicating critical severity. The vendor has released version 0.31.0.0 which patches this issue.
Potential Impact
Successful exploitation allows an attacker with at least limited privileges to inject malicious JavaScript into group and role management fields. This stored payload executes in the context of privileged administrative users viewing these fields, potentially leading to session hijacking, privilege escalation, or other impacts associated with stored XSS. The vulnerability affects confidentiality, integrity, and availability as indicated by the CVSS vector (C:H/I:L/A:L).
Mitigation Recommendations
Upgrade to ci4ms version 0.31.0.0 or later, where this vulnerability has been patched. Applying this official fix eliminates the improper input sanitization and unsafe output encoding that lead to stored XSS. No additional mitigation steps are indicated by the vendor advisory.
CVE-2026-34557: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ci4-cms-erp ci4ms
Description
CI4MS versions prior to 0. 31. 0. 0 contain a stored cross-site scripting (XSS) vulnerability in the group and role management functionality. The application fails to properly sanitize user input in multiple group-related fields, allowing malicious JavaScript payloads to be stored server-side. These payloads are then rendered unsafely in privileged administrative views without proper output encoding, leading to stored XSS within the role and permission management context. This vulnerability has been patched in version 0. 31. 0. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CI4MS, a CodeIgniter 4-based CMS skeleton, suffers from a stored cross-site scripting vulnerability (CWE-79) in versions before 0.31.0.0. The issue arises because user-controlled input in three distinct group-related fields is not properly sanitized before storage. When these malicious inputs are later rendered in administrative interfaces without appropriate output encoding, it results in stored XSS that can affect privileged users managing roles and permissions. The vulnerability has a CVSS 3.1 score of 9.1, indicating critical severity. The vendor has released version 0.31.0.0 which patches this issue.
Potential Impact
Successful exploitation allows an attacker with at least limited privileges to inject malicious JavaScript into group and role management fields. This stored payload executes in the context of privileged administrative users viewing these fields, potentially leading to session hijacking, privilege escalation, or other impacts associated with stored XSS. The vulnerability affects confidentiality, integrity, and availability as indicated by the CVSS vector (C:H/I:L/A:L).
Mitigation Recommendations
Upgrade to ci4ms version 0.31.0.0 or later, where this vulnerability has been patched. Applying this official fix eliminates the improper input sanitization and unsafe output encoding that lead to stored XSS. No additional mitigation steps are indicated by the vendor advisory.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-30T16:31:39.265Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cae2bce6bfc5ba1d6c3e4b
Added to database: 3/30/2026, 8:53:16 PM
Last enriched: 4/7/2026, 10:55:27 AM
Last updated: 5/15/2026, 3:01:40 AM
Views: 74
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.