EUVD-2026-17214

| CVE-2026-34558 CRITICAL
2026-03-30 GitHub_M GHSA-v77r-xg3p-75g7
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Patch Released
Apr 01, 2026 - 02:30 nvd
Patch available
Analysis Generated
Mar 30, 2026 - 21:00 vuln.today
EUVD ID Assigned
Mar 30, 2026 - 21:00 euvd
EUVD-2026-17214
CVE Published
Mar 30, 2026 - 20:24 nvd
CRITICAL 9.1

Tags

Description

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within the Methods Management functionality when creating or managing application methods/pages. Multiple input fields accept attacker-controlled JavaScript payloads that are stored server-side without sanitization or output encoding. These stored values are later rendered directly into administrative interfaces and global navigation components without proper encoding, resulting in Stored DOM-Based Cross-Site Scripting (XSS). This issue has been patched in version 0.31.0.0.

Analysis

Stored Cross-Site Scripting in CI4MS methods management allows authenticated users to inject malicious JavaScript into administrative interfaces and global navigation, affecting all users including administrators. The vulnerability affects CI4MS versions before 0.31.0.0 with a CVSS score of 9.1 due to scope change (C) enabling privilege escalation. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all CI4MS deployments and identify current version numbers across production and non-production environments. Within 7 days: Apply vendor-released patch to upgrade all instances to CI4MS version 0.31.0.0 or later, beginning with production systems and validating functionality post-deployment. …

Sign in for detailed remediation steps.

Priority Score

46
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +46
POC: 0

Share

EUVD-2026-17214 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy