Skip to main content
Mallory

CI4MS Flaws Enable Persistent Access and Admin Account Compromise

internet-facing-service-vulnerabilityidentity-authentication-vulnerabilitywidely-deployed-product-advisory
Updated April 2, 2026 at 01:03 AM2 sources
Share:
CI4MS Flaws Enable Persistent Access and Admin Account Compromise

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

CI4MS, a CodeIgniter 4-based CMS skeleton, was found to contain two critical vulnerabilities affecting versions prior to 0.31.0.0. One flaw, tracked as CVE-2026-34572, allowed users with existing sessions to remain authenticated after their accounts were deactivated because account status was only enforced at login. With no session expiration or account expiration controls in place, deactivated users could keep accessing the application indefinitely until they manually logged out, undermining intended access restrictions across all roles.

A second issue, CVE-2026-34571, exposed the platform to stored cross-site scripting in backend user management. Improper sanitization of user-supplied input allowed persistent JavaScript to execute automatically when administrators viewed affected pages, creating a path to session hijacking, privilege escalation, and full administrative account compromise. Both vulnerabilities were addressed in CI4MS version 0.31.0.0.

Timeline

  1. Apr 1, 2026

    CI4MS releases version 0.31.0.0 fixing two critical vulnerabilities

    CI4MS fixed two vulnerabilities in version 0.31.0.0: a logic flaw that allowed deactivated users to retain authenticated access through existing sessions, and a stored XSS issue in backend user management that could enable session hijacking and administrative account compromise.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

CI4MS Flaws Enable Account Takeover and Persistent Access After Deletion

CI4MS Flaws Enable Account Takeover and Persistent Access After Deletion

CI4MS, a CodeIgniter 4-based CMS skeleton, patched two high-severity vulnerabilities in version **0.31.0.0** that could let attackers compromise accounts and bypass intended access controls. **CVE-2026-34557** affects versions before that release and stems from improper sanitization in group and role management fields, allowing attackers with low privileges to inject malicious JavaScript that is later rendered in privileged administrative views. The stored DOM XSS can be used in the permissions-management context to escalate privileges and potentially achieve full account takeover across roles. A second flaw, **CVE-2026-34570**, allowed deleted users to keep using already-active sessions because account deletion did not invalidate existing authentication tokens or sessions. In affected versions prior to **0.31.0.0**, access checks were enforced only at login, so a removed account could retain unauthorized access until the session ended or the user logged out manually. The issue undermined access control and exposed confidentiality, integrity, and availability until the vendor corrected session handling in the patched release.

1 months ago
CI4MS Stored DOM XSS Flaws Enable Account Takeover and Privilege Escalation

CI4MS Stored DOM XSS Flaws Enable Account Takeover and Privilege Escalation

Two high-severity vulnerabilities in **CI4MS**, a CodeIgniter 4-based CMS skeleton, allow authenticated low-privilege users to trigger **stored DOM-based XSS** that can lead to full account takeover across roles and privilege escalation. **`CVE-2026-34558`** affects the **Methods Management** functionality, where improperly sanitized and encoded user input can be stored server-side and later executed in administrative interfaces and global navigation components. A second flaw, **`CVE-2026-34565`**, impacts **Menu Management** for posts, where malicious post data added to navigation menus can execute in both admin dashboards and public-facing menus. Both issues are classified as **CWE-79** and carry the same **CVSS v3.1** vector, `AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L`; they affect CI4MS versions prior to **`0.31.0.0`** and were patched in **`0.31.0.0`**.

3 weeks ago
Unauthenticated SQL Injection Flaws Expose Data in CMSsite and XATABoost CMS

Unauthenticated SQL Injection Flaws Expose Data in CMSsite and XATABoost CMS

Two content management systems were identified with **unauthenticated SQL injection** vulnerabilities that allow remote attackers to tamper with backend database queries and extract sensitive information. `CVE-2019-25697` affects **CMSsite 1.0**, where the `cat_id` parameter in `category.php` can be abused through crafted `GET` requests, potentially exposing usernames, credentials, and other database contents. A separate flaw, `CVE-2018-25300`, affects **XATABoost CMS 1.0.0** through a **union-based SQL injection** in the `id` parameter of `news.php`, also reachable remotely without authentication via crafted `GET` requests. Both records were published with **CWE-89** classification, CVSS v3.1 and v4.0 scoring data, and references to public advisories and exploit resources, underscoring the risk of database compromise in internet-exposed deployments.

3 days ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.