CVE-2026-34569: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ci4-cms-erp ci4ms
CVE-2026-34569 is a critical stored cross-site scripting (XSS) vulnerability in ci4ms, a CodeIgniter 4-based CMS. Versions prior to 0. 31. 0. 0 fail to properly sanitize user input in blog category titles, allowing attackers to inject malicious JavaScript payloads. These payloads are stored server-side and rendered unsafely in multiple contexts including public blog category pages, admin interfaces, and blog post views. Exploitation requires low privileges but no user interaction, and can lead to full compromise of confidentiality, integrity, and availability. The vulnerability has a CVSS score of 10. 0, reflecting its critical severity. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2026-34569 is a critical stored cross-site scripting (XSS) vulnerability affecting ci4ms, a CMS built on the CodeIgniter 4 framework. The vulnerability arises from improper neutralization of user input during web page generation, specifically in the blog category title field. Prior to version 0.31.0.0, the application does not sanitize or encode user-controlled input when creating or editing blog categories. This allows an attacker with at least limited privileges (PR:L) to inject malicious JavaScript code that is stored on the server. The stored payload is then rendered unsafely across multiple contexts: public-facing blog category pages, administrative interfaces, and blog post views. Because the malicious script executes in the context of the victim’s browser without requiring user interaction, it can lead to session hijacking, credential theft, defacement, or further exploitation such as pivoting within the network. The vulnerability has a CVSS v3.1 score of 10.0, indicating critical impact on confidentiality, integrity, and availability with network attack vector, low attack complexity, and no user interaction needed. Although no known exploits have been reported in the wild, the vulnerability’s characteristics make it highly exploitable. The root cause is the lack of proper output encoding and input validation in the affected versions. The issue was addressed and patched in ci4ms version 0.31.0.0 by implementing proper sanitization and encoding mechanisms for user input in blog category titles.
Potential Impact
The impact of CVE-2026-34569 is severe for organizations using affected versions of ci4ms. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of users’ browsers, including administrators and regular visitors. This can lead to theft of sensitive information such as authentication tokens, session cookies, and personal data, resulting in account takeover and unauthorized access. Attackers can also perform actions on behalf of victims, deface websites, or distribute malware. The vulnerability compromises confidentiality, integrity, and availability of the affected web application and potentially the underlying network if attackers pivot from compromised accounts. Given ci4ms is a CMS, the attack surface includes public-facing websites and internal admin panels, increasing risk. Organizations relying on ci4ms for content management and enterprise resource planning (ERP) functions face operational disruption, reputational damage, and regulatory compliance issues if exploited. The critical CVSS score underscores the urgency of remediation to prevent widespread exploitation.
Mitigation Recommendations
To mitigate CVE-2026-34569, organizations should immediately upgrade ci4ms to version 0.31.0.0 or later, where the vulnerability is patched. In addition, implement strict input validation on all user-supplied data, especially fields that are rendered in HTML contexts. Employ context-aware output encoding (e.g., HTML entity encoding) to neutralize any potentially malicious scripts before rendering. Conduct thorough code reviews and security testing to identify similar injection points. Use Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce impact if exploitation occurs. Limit privileges of users who can create or edit blog categories to reduce attack surface. Monitor web application logs for suspicious input patterns or anomalous behavior indicative of attempted XSS attacks. Educate developers on secure coding practices related to input sanitization and output encoding. Finally, consider deploying a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting ci4ms.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, India, Brazil, Japan
CVE-2026-34569: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ci4-cms-erp ci4ms
Description
CVE-2026-34569 is a critical stored cross-site scripting (XSS) vulnerability in ci4ms, a CodeIgniter 4-based CMS. Versions prior to 0. 31. 0. 0 fail to properly sanitize user input in blog category titles, allowing attackers to inject malicious JavaScript payloads. These payloads are stored server-side and rendered unsafely in multiple contexts including public blog category pages, admin interfaces, and blog post views. Exploitation requires low privileges but no user interaction, and can lead to full compromise of confidentiality, integrity, and availability. The vulnerability has a CVSS score of 10. 0, reflecting its critical severity. No known exploits are currently reported in the wild.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34569 is a critical stored cross-site scripting (XSS) vulnerability affecting ci4ms, a CMS built on the CodeIgniter 4 framework. The vulnerability arises from improper neutralization of user input during web page generation, specifically in the blog category title field. Prior to version 0.31.0.0, the application does not sanitize or encode user-controlled input when creating or editing blog categories. This allows an attacker with at least limited privileges (PR:L) to inject malicious JavaScript code that is stored on the server. The stored payload is then rendered unsafely across multiple contexts: public-facing blog category pages, administrative interfaces, and blog post views. Because the malicious script executes in the context of the victim’s browser without requiring user interaction, it can lead to session hijacking, credential theft, defacement, or further exploitation such as pivoting within the network. The vulnerability has a CVSS v3.1 score of 10.0, indicating critical impact on confidentiality, integrity, and availability with network attack vector, low attack complexity, and no user interaction needed. Although no known exploits have been reported in the wild, the vulnerability’s characteristics make it highly exploitable. The root cause is the lack of proper output encoding and input validation in the affected versions. The issue was addressed and patched in ci4ms version 0.31.0.0 by implementing proper sanitization and encoding mechanisms for user input in blog category titles.
Potential Impact
The impact of CVE-2026-34569 is severe for organizations using affected versions of ci4ms. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of users’ browsers, including administrators and regular visitors. This can lead to theft of sensitive information such as authentication tokens, session cookies, and personal data, resulting in account takeover and unauthorized access. Attackers can also perform actions on behalf of victims, deface websites, or distribute malware. The vulnerability compromises confidentiality, integrity, and availability of the affected web application and potentially the underlying network if attackers pivot from compromised accounts. Given ci4ms is a CMS, the attack surface includes public-facing websites and internal admin panels, increasing risk. Organizations relying on ci4ms for content management and enterprise resource planning (ERP) functions face operational disruption, reputational damage, and regulatory compliance issues if exploited. The critical CVSS score underscores the urgency of remediation to prevent widespread exploitation.
Mitigation Recommendations
To mitigate CVE-2026-34569, organizations should immediately upgrade ci4ms to version 0.31.0.0 or later, where the vulnerability is patched. In addition, implement strict input validation on all user-supplied data, especially fields that are rendered in HTML contexts. Employ context-aware output encoding (e.g., HTML entity encoding) to neutralize any potentially malicious scripts before rendering. Conduct thorough code reviews and security testing to identify similar injection points. Use Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce impact if exploitation occurs. Limit privileges of users who can create or edit blog categories to reduce attack surface. Monitor web application logs for suspicious input patterns or anomalous behavior indicative of attempted XSS attacks. Educate developers on secure coding practices related to input sanitization and output encoding. Finally, consider deploying a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting ci4ms.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-30T16:56:30.998Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cd93ece6bfc5ba1d003636
Added to database: 4/1/2026, 9:53:48 PM
Last enriched: 4/1/2026, 10:09:12 PM
Last updated: 4/2/2026, 4:15:45 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.