CVE-2026-34560
🔴 Łataj teraz
Nieprawidłowe kodowanie danych w CI4MS umożliwia atak XSS przy przeglądaniu logów przez administratora.
CVSS
9.1
EPSS
0.0%
Exploit
poc
Vendor
ci4-cms-erp
Opis źródłowy (NVD)
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application renders user-controlled input unsafely within the logs interface. If any stored XSS payload exists within logged data, it is rendered without proper output encoding. This issue becomes a Blind XSS scenario because the attacker does not see immediate execution. Instead, the payload is stored within application logs and only executes later when an administrator views the logs page. This issue has been patched in version 0.31.0.0.
exploit xss
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-01 22:16:19 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-13 18:00:22 UTC |
Referencje
- https://github.com/ci4-cms-erp/ci4ms/releases/tag/0.31.0.0 (security-advisories@github.com) [Release Notes]
- https://github.com/ci4-cms-erp/ci4ms/security/advisories/GHSA-r4v5-rwr2-q7r4 (security-advisories@github.com) [Exploit, Vendor Advisory]