Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-34568 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: CI4MS suffers from a Stored XSS vulnerability. <br>πŸ’₯ **Consequences**: Malicious scripts execute in victims' browsers when viewing blog posts. This can lead to session hijacking, data theft, or defacement.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-79 (Improper Neutralization of Input During Web Page Generation). <br>πŸ” **Flaw**: User input is not properly sanitized when creating or editing blog articles, allowing script injection.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: CI4MS (Ci4MS). <br>πŸ“‰ **Versions**: All versions **prior to 0.31.0.0**. <br>🏒 **Vendor**: ci4-cms-erp.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Attacker Actions**: Execute arbitrary JavaScript in the context of the victim's browser. <br>πŸ”‘ **Impact**: Steal cookies/sessions, redirect users, or perform actions on behalf of the user.…

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: Medium. <br>πŸ” **Auth**: Requires **Low Privileges** (PR:L) to create/edit posts. <br>πŸ–±οΈ **UI**: No user interaction needed (UI:N) for the script to run upon viewing.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: No public PoC or exploit code listed in the data. <br>πŸ“œ **Status**: Referenced via GitHub Security Advisory (GHSA-x7wh-g25g-53vg) and release notes.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for CI4MS instances. <br>πŸ“ **Test**: Attempt to inject `<script>alert(1)</script>` into blog post titles or content fields.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. <br>πŸ”§ **Patch**: Upgrade to **version 0.31.0.0** or later. <br>πŸ”— **Source**: Official GitHub release and security advisory.

Q9What if no patch? (Workaround)

πŸ›‘οΈ **Workaround**: If upgrading is impossible, implement strict input validation and output encoding on the server side for all blog content fields. Restrict user permissions to trusted admins only.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: High. <br>πŸ“… **Priority**: Patch immediately. Stored XSS allows persistent attacks against any user viewing the content. CVSS Score indicates significant impact.