top of page
perceptive_background_267k.jpg

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0,…

Published:

7 april 2026 om 22:00:00

Alert date:

8 april 2026 om 16:01:27

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies

CI4MS, a CodeIgniter 4-based CMS skeleton, contains a vulnerability in versions prior to 0.31.4.0 where the Install::index() controller accepts unvalidated POST parameters that are written directly to the .env configuration file. Attackers can inject arbitrary configuration directives by including newline characters in the host parameter. The vulnerability is exacerbated by disabled CSRF protection on install routes and bypassable InstallFilter when cache settings are empty. This allows complete compromise of application configuration during installation or when cache expires. The issue has been patched in version 0.31.4.0.

Technical details

Mitigation steps:

Affected products:

CI4MS
CodeIgniter 4

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page