Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-34557

CI4MS: Permissions Management Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS
Back to all
CVE

CVE-2026-34557

CI4MS: Permissions Management Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS

Summary

Vulnerability: Stored DOM XSS via Group / Role Management Fields (Administrative Context Execution)

  • Stored Cross-Site Scripting via Unsanitized Group / Role Management Inputs

Description

The application fails to properly sanitize user-controlled input within group and role management functionality. Multiple input fields (three distinct group-related fields) can be injected with malicious JavaScript payloads, which are then stored server-side.

These stored payloads are later rendered unsafely within privileged administrative views without proper output encoding, leading to stored cross-site scripting (XSS) within the role and permission management context.

Affected Functionality

  • Group creation and editing functionality
  • Role and permission assignment interfaces
  • Storage and retrieval of group-related data

Attack Scenario

  • An attacker injects a malicious XSS payload into one or more group-related input fields.
  • The application stores these values without sanitization or encoding.
  • An administrator views the group or role management interface.
  • The payload executes automatically in the administrator’s browser.

Impact

  • Persistent Stored XSS
  • Execution of arbitrary JavaScript in victims’ browsers
  • Privilege escalation when viewed by administrators
  • Full administrator account takeover
  • Full compromise of the entire application

Endpoints:

  • /backend/users/groupList/

Steps To Reproduce (POC)

  1. Navigate to the Group / Role Management page
  2. Insert an XSS payload into any of the three group-related input fields such as:

<img src=x onerror=alert(document.domain)>

  1. Save the group or role changes
  2. View the group/role management page as an administrator
  3. Observe the XSS payload executing automatically

Remediation

  • Never use .html() again or any innerHTML-style like JS in your PHP, or any other sink, even if user inputs that flow into them are not clear, they still represent real world danger as an attacker can make use of this to exploit the application via XSS. And do HTML Encoding as much as possible and always do Sanitization, theres no sanitization there unfortunately. Also apply CSP, HttpOnly, SameSite, and Secure upon all application, they reduce severity of XSS & escalated-CSRF via XSS and do great jobs

Ready Video POC:

https://mega.nz/file/6QUEXDbR#JXzYXg9bef_NeSUVFB4R03UeXLtAVtYwTRsdrHLlokU

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
9.1
-
3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
C
H
U
-

Related Resources

No items found.

References

https://github.com/ci4-cms-erp/ci4ms/security/advisories/GHSA-rpjr-985c-qhvm, https://nvd.nist.gov/vuln/detail/CVE-2026-34557, https://github.com/ci4-cms-erp/ci4ms

Severity

9.1

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
9.1
EPSS Probability
0.00046%
EPSS Percentile
0.14155%
Introduced Version
0
Fix Available
0.31.0.0

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading