Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-34559 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Stored XSS in CI4MS blog tag creation/editing. πŸ’₯ **Consequences**: Malicious JS injected into tag names executes in victim browsers, compromising user sessions and data integrity.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-79 (Improper Neutralization of Input During Web Page Generation). ❌ **Flaw**: Failure to sanitize user-controlled input when creating or editing blog tags.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: CI4MS (Ci4MS). πŸ“‰ **Versions**: All versions **prior to 0.31.0.0**. 🏒 **Vendor**: ci4-cms-erp.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Execute arbitrary JavaScript in the context of authenticated users. πŸ“Š **Impact**: Steal cookies, hijack sessions, deface pages, or redirect users to malicious sites.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Threshold**: Medium. ⚠️ **Auth Required**: Privileges Required (PR:L). πŸ–±οΈ **UI Required**: None (UI:N). Attacker needs some access to create/edit tags, but no user interaction is needed for the payload to trigger.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: No specific PoC listed in the data. 🌐 **References**: GitHub release notes and security advisory (GHSA-4333-387x-w245) are available for verification.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Inspect blog tag input fields. πŸ§ͺ **Test**: Try injecting `<script>alert(1)</script>` into tag names. πŸ“‘ **Scan**: Look for stored XSS patterns in tag-related database entries or HTML output.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ“₯ **Patch**: Upgrade to **CI4MS version 0.31.0.0** or later. πŸ”— **Source**: Official GitHub release page.

Q9What if no patch? (Workaround)

πŸ› οΈ **Workaround**: If unpatched, strictly sanitize tag inputs server-side. 🚫 **Mitigation**: Disable tag editing for untrusted users or implement strict Content Security Policy (CSP) headers.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: High. πŸ“ˆ **Priority**: Critical for CMS admins. πŸš€ **Action**: Patch immediately to prevent session hijacking and data theft via stored XSS.