Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-34571

CI4MS: Stored Cross‑Site Scripting (Stored XSS) in Backend User Management Allows Session Hijacking and Full Administrative Account Compromise
Back to all
CVE

CVE-2026-34571

CI4MS: Stored Cross‑Site Scripting (Stored XSS) in Backend User Management Allows Session Hijacking and Full Administrative Account Compromise

Summary

A critical Stored Cross-Site Scripting (Stored XSS) vulnerability exists in the backend user management functionality. The application fails to properly sanitize user-controlled input before rendering it in the administrative interface, allowing attackers to inject persistent JavaScript code. This results in automatic execution whenever backend users access the affected page, enabling session hijacking, privilege escalation, and full administrative account compromise.

---

Details

The vulnerability resides in the backend user creation feature accessible via:

/backend/users

User-supplied input in the name and surname fields is stored without proper validation or sanitization. When this data is later rendered in the backend users listing page, it is injected directly into the HTML without output encoding.

Because of this, attackers can embed malicious JavaScript payloads that execute in the context of authenticated backend users.

This indicates missing contextual output escaping (e.g., HTML encoding) and insufficient input sanitization, leading to persistent script execution.

The vulnerability is particularly severe because:

  • The payload is stored in the database (persistent XSS).
  • The script executes automatically on page load.
  • The affected page appears to be an administrative/backend interface, increasing the risk of privilege escalation.

---

PoC

Steps to reproduce:

  1. Navigate to:
http://localhost:8080/backend/users
  1. Click Add New User.
  2. Create a new user.
  3. In the name and surname fields, insert the following payload:
adnan"><img src=1 onerror=alert(document.cookie)><<e>img src=1 onerror=alert(document.cookie)>
  1. Save the user.
  2. After saving, a popup displaying cookies will appear, demonstrating JavaScript execution.
  3. Revisit:
http://localhost:8080/backend/users
  1. The popup automatically triggers again, confirming that the malicious script is stored and executed persistently.

<img width="1534" height="834" alt="image" src="https://github.com/user-attachments/assets/83f3d124-cf2e-472d-87cc-8c668ea81cba" />

---

Impact

Severity: Critical

This vulnerability enables:

  • Persistent execution of attacker-controlled JavaScript in privileged backend contexts.
  • Theft of session cookies, potentially leading to full account takeover.
  • Unauthorized actions performed on behalf of administrators (CSRF-like behavior via XSS).
  • Privilege escalation if a high-privilege user views the page.
  • Injection of keyloggers, credential harvesting scripts, or malicious redirects.
  • Full compromise of backend administrative functionality depending on role permissions.

Since the payload executes automatically without user interaction once stored, exploitation requires minimal effort and can impact all backend users.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
9.9
-
3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
C
H
U
-

Related Resources

No items found.

References

https://github.com/ci4-cms-erp/ci4ms/security/advisories/GHSA-fc4p-p49v-r948, https://github.com/ci4-cms-erp/ci4ms

Severity

9.9

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
9.9
EPSS Probability
0%
EPSS Percentile
0%
Introduced Version
0
Fix Available
0.31.0.0

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading