Critical (9.1)

CVE-2026-34558: CI4MS XSS — Critical — Patch Now

CVE-2026-34558

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to proper...

Overview

CI4MS, a CodeIgniter 4-based CMS skeleton, contains a critical stored DOM-based Cross-Site Scripting (XSS) vulnerability tracked as CVE-2026-34558. The flaw exists in the Methods Management functionality, where multiple input fields fail to sanitize user-supplied JavaScript code. This unsanitized input is stored on the server and later rendered directly into administrative panels and navigation components, executing the malicious scripts automatically.

Technical Details

The vulnerability stems from improper input handling. When administrators or users with appropriate privileges create or manage application methods or pages, attacker-controlled JavaScript payloads can be submitted through various fields. The system stores these payloads without sanitization. Subsequently, when the stored data is displayed-particularly within admin interfaces and global navigation-the application fails to apply proper output encoding. This results in the browser interpreting the stored data as executable code, not inert text, leading to a stored DOM-based XSS attack. The attack complexity is low and requires no user interaction beyond viewing a compromised page.

Impact

With a CVSS score of 9.1 (Critical), this vulnerability poses a severe risk. An attacker with low-privileged access to the Methods Management feature can inject persistent malicious scripts. These scripts execute in the context of any administrator or user viewing the affected components, potentially leading to full administrative account takeover, session hijacking, defacement, or data theft from within the application. Successful exploitation could be the first step in a larger attack chain, leading to a complete system compromise. For context on how such initial access can lead to major incidents, recent data breach reports are available at breach reports.

Remediation and Mitigation

The primary and mandatory action is to upgrade CI4MS to version 0.31.0.0 or later, which contains the patch that properly sanitizes input and encodes output. If an immediate upgrade is not possible, consider the following temporary mitigation:

  • Restrict access to the Methods Management functionality to only strictly necessary, highly trusted administrators.
  • Implement a Web Application Firewall (WAF) with rules tuned to block XSS payloads. Note that this is not a substitute for patching.
  • Audit administrative user accounts and enforce strong, unique passwords and multi-factor authentication to reduce the risk of low-privileged account compromise.

Organizations should apply the patch as a high-priority action. For ongoing coverage of emerging threats, follow updates at security news.

Security Insight

This vulnerability highlights the persistent risk in admin and development interfaces within CMS frameworks, which are often overlooked during security testing in favor of public-facing features. It mirrors a common pattern seen in similar skeletons and boilerplates where rapid development readiness is prioritized over secure input/output handling by default, creating a widespread vulnerability in any project built upon the flawed base.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2026-34558?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.