HomeCi4-Cms-ErpCVE-2026-39394

CVE-2026-39394

HIGH
8.1CVSS
Published: 2026-04-08
Updated: 2026-04-16
AI Analysis

Description

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the Install::index() controller reads the host POST parameter without any validation and passes it directly into updateEnvSettings(), which writes it into the .env file via preg_replace(). Because newline characters in the value are not stripped, an attacker can inject arbitrary configuration directives into the .env file. The install routes have CSRF protection explicitly disabled, and the InstallFilter can be bypassed when cache('settings') is empty (cache expiry or fresh deployment). This vulnerability is fixed in 0.31.4.0.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-93

Metadata

Primary Vendor
CI4-CMS-ERP
Published
4/8/2026
Last Modified
4/16/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

ci4-cms-erp : ci4ms

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-39394 | HIGH Severity | CVEDatabase.com | CVEDatabase.com