Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-25510 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: CI4MS < 0.28.5.0 has a critical code injection flaw. πŸ“‰ **Consequences**: Attackers can upload & execute arbitrary PHP code, leading to full **Remote Code Execution (RCE)** on the server.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-434** (Unrestricted Upload of File with Dangerous Type). The file editor/saver endpoint fails to validate uploaded files, allowing malicious PHP scripts to be saved and executed.

Q3Who is affected? (Versions/Components)

🏒 **Affected**: **ci4-cms-erp / ci4ms**. πŸ“¦ **Version**: All versions **prior to 0.28.5.0**. If you are running 0.28.5.0 or later, you are safe!

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Power**: With basic access, hackers gain **Full Control**. They can read sensitive data, modify system files, install backdoors, and pivot to other internal networks.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **Medium**. ⚠️ **Auth Required**: Yes, the attacker must be a **verified user** with **file editor permissions**. Not fully open to the public, but easy for insiders or compromised accounts.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp?**: Currently **No public PoC/Exploit** listed in the data. However, the CVSS score is **Critical (9.8)**, meaning the logic is straightforward for skilled attackers to develop quickly.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check your CI4MS version (must be < 0.28.5.0). 2. Audit user permissions: Do you have users with 'file editor' rights? 3. Scan for unexpected `.php` files in upload directories.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed?**: **Yes**. The vendor released a fix in version **0.28.5.0**. πŸ“ **Patch**: Update immediately. See GitHub Advisory [GHSA-gp56-f67f-m4px] for details.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: 1. **Revoke** 'file editor' permissions from all users immediately. 2. Disable the file upload/edit feature if possible. 3. Implement strict WAF rules to block PHP execution in upload folders.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 Despite requiring auth, the impact is **RCE**. Treat this as a **P0** incident. Update to v0.28.5.0 **TODAY** to prevent potential server takeover.