CVE-2026-34566: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ci4-cms-erp ci4ms
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within the Page Management functionality when creating or editing pages. Multiple input fields accept attacker-controlled JavaScript payloads that are stored server-side. These stored values are later rendered without proper output encoding across administrative page lists and public-facing page views, leading to stored DOM-based cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.
AI Analysis
Technical Summary
CVE-2026-34566 is a stored cross-site scripting (XSS) vulnerability identified in ci4ms, a CMS built on the CodeIgniter 4 framework. The vulnerability stems from the application’s failure to properly neutralize user-supplied input within the Page Management module before storing it. Specifically, multiple input fields accept attacker-controlled JavaScript code, which is saved on the server and later rendered in administrative page lists and public-facing views without adequate output encoding or sanitization. This results in stored DOM-based XSS, where malicious scripts execute in the browsers of users viewing the affected pages. The vulnerability requires an attacker to have at least limited privileges (PR:L) to inject payloads but does not require user interaction (UI:N) to trigger. The vulnerability affects all ci4ms versions prior to 0.31.0.0 and has been addressed in that release. The CVSS v3.1 base score is 9.1, reflecting critical severity due to high confidentiality impact, low attack complexity, and the ability to affect multiple users and system components. While no public exploits are currently known, the vulnerability poses a significant risk to the confidentiality and availability of affected systems if exploited.
Potential Impact
The impact of CVE-2026-34566 is substantial for organizations using ci4ms versions before 0.31.0.0. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of authenticated users, including administrators, potentially leading to session hijacking, credential theft, unauthorized actions, and data exfiltration. Since the malicious payloads are stored server-side, the attack surface includes all users accessing the compromised pages, increasing the scope of impact. This can undermine trust in the CMS, disrupt operations, and facilitate further attacks such as privilege escalation or lateral movement within the network. The vulnerability also risks exposing sensitive business data and user information, affecting confidentiality and integrity. Given the modular and RBAC-enabled nature of ci4ms, attackers might leverage this flaw to bypass access controls or manipulate content management workflows. The critical CVSS score underscores the urgency for remediation to prevent potential widespread compromise.
Mitigation Recommendations
To mitigate CVE-2026-34566, organizations should immediately upgrade ci4ms to version 0.31.0.0 or later, where the vulnerability is patched. In addition to upgrading, administrators should audit all user-generated content in the Page Management module for suspicious scripts or payloads and remove any malicious entries. Implement strict input validation and output encoding practices beyond the vendor patch, such as using Content Security Policy (CSP) headers to restrict script execution sources and employing HTTP-only and secure cookies to protect session tokens. Regularly review and tighten RBAC permissions to limit the number of users who can create or edit pages. Employ web application firewalls (WAFs) with custom rules to detect and block common XSS payloads targeting ci4ms. Conduct security awareness training for administrators to recognize signs of XSS exploitation. Finally, integrate continuous monitoring and logging to detect anomalous behaviors indicative of exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Japan, South Korea
CVE-2026-34566: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ci4-cms-erp ci4ms
Description
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within the Page Management functionality when creating or editing pages. Multiple input fields accept attacker-controlled JavaScript payloads that are stored server-side. These stored values are later rendered without proper output encoding across administrative page lists and public-facing page views, leading to stored DOM-based cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34566 is a stored cross-site scripting (XSS) vulnerability identified in ci4ms, a CMS built on the CodeIgniter 4 framework. The vulnerability stems from the application’s failure to properly neutralize user-supplied input within the Page Management module before storing it. Specifically, multiple input fields accept attacker-controlled JavaScript code, which is saved on the server and later rendered in administrative page lists and public-facing views without adequate output encoding or sanitization. This results in stored DOM-based XSS, where malicious scripts execute in the browsers of users viewing the affected pages. The vulnerability requires an attacker to have at least limited privileges (PR:L) to inject payloads but does not require user interaction (UI:N) to trigger. The vulnerability affects all ci4ms versions prior to 0.31.0.0 and has been addressed in that release. The CVSS v3.1 base score is 9.1, reflecting critical severity due to high confidentiality impact, low attack complexity, and the ability to affect multiple users and system components. While no public exploits are currently known, the vulnerability poses a significant risk to the confidentiality and availability of affected systems if exploited.
Potential Impact
The impact of CVE-2026-34566 is substantial for organizations using ci4ms versions before 0.31.0.0. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of authenticated users, including administrators, potentially leading to session hijacking, credential theft, unauthorized actions, and data exfiltration. Since the malicious payloads are stored server-side, the attack surface includes all users accessing the compromised pages, increasing the scope of impact. This can undermine trust in the CMS, disrupt operations, and facilitate further attacks such as privilege escalation or lateral movement within the network. The vulnerability also risks exposing sensitive business data and user information, affecting confidentiality and integrity. Given the modular and RBAC-enabled nature of ci4ms, attackers might leverage this flaw to bypass access controls or manipulate content management workflows. The critical CVSS score underscores the urgency for remediation to prevent potential widespread compromise.
Mitigation Recommendations
To mitigate CVE-2026-34566, organizations should immediately upgrade ci4ms to version 0.31.0.0 or later, where the vulnerability is patched. In addition to upgrading, administrators should audit all user-generated content in the Page Management module for suspicious scripts or payloads and remove any malicious entries. Implement strict input validation and output encoding practices beyond the vendor patch, such as using Content Security Policy (CSP) headers to restrict script execution sources and employing HTTP-only and secure cookies to protect session tokens. Regularly review and tighten RBAC permissions to limit the number of users who can create or edit pages. Employ web application firewalls (WAFs) with custom rules to detect and block common XSS payloads targeting ci4ms. Conduct security awareness training for administrators to recognize signs of XSS exploitation. Finally, integrate continuous monitoring and logging to detect anomalous behaviors indicative of exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-30T16:56:30.997Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cd93ece6bfc5ba1d00362a
Added to database: 4/1/2026, 9:53:48 PM
Last enriched: 4/1/2026, 10:09:54 PM
Last updated: 4/6/2026, 12:51:52 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.