CVE-2026-34558: CI4MS XSS — Critical — Patch Now
CVE-2026-34558
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to proper...
Overview
CI4MS, a CodeIgniter 4-based CMS skeleton, contains a critical stored DOM-based Cross-Site Scripting (XSS) vulnerability tracked as CVE-2026-34558. The flaw exists in the Methods Management functionality, where multiple input fields fail to sanitize user-supplied JavaScript code. This unsanitized input is stored on the server and later rendered directly into administrative panels and navigation components, executing the malicious scripts automatically.
Technical Details
The vulnerability stems from improper input handling. When administrators or users with appropriate privileges create or manage application methods or pages, attacker-controlled JavaScript payloads can be submitted through various fields. The system stores these payloads without sanitization. Subsequently, when the stored data is displayed-particularly within admin interfaces and global navigation-the application fails to apply proper output encoding. This results in the browser interpreting the stored data as executable code, not inert text, leading to a stored DOM-based XSS attack. The attack complexity is low and requires no user interaction beyond viewing a compromised page.
Impact
With a CVSS score of 9.1 (Critical), this vulnerability poses a severe risk. An attacker with low-privileged access to the Methods Management feature can inject persistent malicious scripts. These scripts execute in the context of any administrator or user viewing the affected components, potentially leading to full administrative account takeover, session hijacking, defacement, or data theft from within the application. Successful exploitation could be the first step in a larger attack chain, leading to a complete system compromise. For context on how such initial access can lead to major incidents, recent data breach reports are available at breach reports.
Remediation and Mitigation
The primary and mandatory action is to upgrade CI4MS to version 0.31.0.0 or later, which contains the patch that properly sanitizes input and encodes output. If an immediate upgrade is not possible, consider the following temporary mitigation:
- Restrict access to the Methods Management functionality to only strictly necessary, highly trusted administrators.
- Implement a Web Application Firewall (WAF) with rules tuned to block XSS payloads. Note that this is not a substitute for patching.
- Audit administrative user accounts and enforce strong, unique passwords and multi-factor authentication to reduce the risk of low-privileged account compromise.
Organizations should apply the patch as a high-priority action. For ongoing coverage of emerging threats, follow updates at security news.
Security Insight
This vulnerability highlights the persistent risk in admin and development interfaces within CMS frameworks, which are often overlooked during security testing in favor of public-facing features. It mirrors a common pattern seen in similar skeletons and boilerplates where rapid development readiness is prioritized over secure input/output handling by default, creating a widespread vulnerability in any project built upon the flawed base.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-34558?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to proper...
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerab...
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerab...
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execu...