Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34572: CWE-284: Improper Access Control in ci4-cms-erp ci4ms

0
High
VulnerabilityCVE-2026-34572cvecve-2026-34572cwe-284cwe-613cwe-1254
Published: Wed Apr 01 2026 (04/01/2026, 21:35:10 UTC)
Source: CVE Database V5
Vendor/Project: ci4-cms-erp
Product: ci4ms

Description

CVE-2026-34572 is a high-severity improper access control vulnerability in ci4ms, a CodeIgniter 4-based CMS. The flaw allows deactivated user accounts to maintain active sessions indefinitely because session revocation only occurs at login, not during active sessions. This logic flaw means that users whose accounts are disabled can continue accessing the system until they manually log out, violating intended access control policies. The vulnerability affects versions prior to 0. 31. 0. 0 and has been patched in that release. Exploitation requires at least low privileges and no user interaction, with a network attack vector. The vulnerability impacts confidentiality, integrity, and availability, as unauthorized users retain full access. Organizations using ci4ms should upgrade immediately and implement session management improvements to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 22:08:30 UTC

Technical Analysis

CVE-2026-34572 is a critical improper access control vulnerability identified in ci4ms, a modular CMS built on the CodeIgniter 4 framework. The root cause lies in the backend logic that fails to revoke active user sessions when an account is deactivated. Specifically, the system enforces account state changes only during the authentication process (login), assuming that once authenticated, users remain trusted for the entire session duration. There is no mechanism to expire or invalidate sessions upon account deactivation, allowing deactivated users to maintain persistent access until they manually log out. This behavior violates the principle of least privilege and breaks the intended Role-Based Access Control (RBAC) policy. The vulnerability is classified under CWE-284 (Improper Access Control), CWE-613 (Insufficient Session Expiration), and CWE-1254 (Session Fixation or Improper Session Handling). The CVSS v3.1 base score is 8.8 (high), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The issue was resolved in ci4ms version 0.31.0.0 by implementing immediate session revocation upon account deactivation and improving session expiration handling. No public exploits have been reported yet, but the flaw presents a significant risk for unauthorized persistent access in affected deployments.

Potential Impact

The vulnerability allows deactivated users to retain unauthorized access to the system indefinitely, potentially leading to data breaches, unauthorized modifications, and disruption of services. This undermines the integrity of access control policies and can facilitate insider threats or compromised accounts to persist undetected. Organizations relying on ci4ms for content management or enterprise resource planning may face exposure of sensitive information, unauthorized administrative actions, and potential compliance violations. The persistence of active sessions despite account deactivation complicates incident response and forensic investigations. The broad impact on confidentiality, integrity, and availability makes this a critical risk, especially for organizations with high-value data or regulatory requirements. Attackers with low privileges can exploit this flaw remotely without user interaction, increasing the threat surface and ease of exploitation.

Mitigation Recommendations

Organizations should immediately upgrade ci4ms to version 0.31.0.0 or later, where the vulnerability is patched. In addition to patching, it is recommended to implement the following measures: 1) Enforce strict session management policies, including session expiration and invalidation upon account state changes; 2) Monitor active sessions continuously and provide administrators with tools to forcibly terminate sessions associated with deactivated accounts; 3) Implement multi-factor authentication to reduce risk from compromised credentials; 4) Conduct regular audits of user sessions and access logs to detect anomalies; 5) Harden backend logic to validate user account status on every sensitive operation, not just at login; 6) Educate users and administrators about the importance of logging out and promptly reporting suspicious activity; 7) Deploy Web Application Firewalls (WAF) with custom rules to detect abnormal session behaviors; 8) Integrate session management with centralized identity and access management (IAM) solutions to improve control and visibility. These steps will reduce the risk of persistent unauthorized access and improve overall security posture.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-30T16:56:30.998Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cd93efe6bfc5ba1d0036ee

Added to database: 4/1/2026, 9:53:51 PM

Last enriched: 4/1/2026, 10:08:30 PM

Last updated: 4/1/2026, 10:54:15 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses