top of page
perceptive_background_267k.jpg

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0,…

Published:

7 april 2026 om 22:00:00

Alert date:

8 april 2026 om 16:01:27

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies

CI4MS, a CodeIgniter 4-based CMS skeleton, contains a critical vulnerability in versions prior to 0.31.4.0. The install route guard relies solely on volatile cache checks and .env file existence to prevent post-installation access to the setup wizard. When the database becomes temporarily unreachable during cache misses (TTL expiry or admin-triggered cache clear), the security guard fails open. This allows unauthenticated attackers to overwrite the .env file with malicious database credentials, resulting in complete application takeover. The vulnerability has been patched in version 0.31.4.0.

Technical details

Mitigation steps:

Affected products:

CI4MS
CodeIgniter 4

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page