


Perceptive Security
SOC/SIEM Consultancy

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0,…
Published:
7 april 2026 om 22:00:00
Alert date:
8 april 2026 om 16:01:27
Source:
nvd.nist.gov
Web Technologies
CI4MS, a CodeIgniter 4-based CMS skeleton, contains a vulnerability in versions prior to 0.31.4.0 where the Install::index() controller accepts unvalidated POST parameters that are written directly to the .env configuration file. Attackers can inject arbitrary configuration directives by including newline characters in the host parameter. The vulnerability is exacerbated by disabled CSRF protection on install routes and bypassable InstallFilter when cache settings are empty. This allows complete compromise of application configuration during installation or when cache expires. The issue has been patched in version 0.31.4.0.
Technical details
Mitigation steps:
Affected products:
CI4MS
CodeIgniter 4
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-39394
https://github.com/ci4-cms-erp/ci4ms/security/advisories/GHSA-vfhx-5459-qhqh
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
