Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-41201 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: DOM XSS in CI4MS Backup Module. πŸ“‰ **Consequences**: Attackers inject malicious scripts via tampered SQL filenames. This leads to **Full Account Takeover** and **Privilege Escalation**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-79 (Improper Neutralization of Input During Web Page Generation). πŸ” **Flaw**: The application fails to sanitize user-controlled input (file names) in the backup module.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: CI4MS (CodeIgniter 4 CMS). 🏒 **Vendor**: ci4-cms-erp. πŸ“… **Affected Versions**: Specifically **v0.31.4.0** and likely earlier versions. βœ… **Fixed In**: v0.31.5.0.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: 1. Inject hidden XSS payloads into backup files. 2. Trigger execution when admins view backups. 3. **Steal Admin Cookies/Sessions**. 4. **Take over Admin Accounts**. 5.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Auth Required**: YES. The CVSS vector shows **PR:H** (Privileges Required: High). 🎯 **Threshold**: Medium-High.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: NO. The `pocs` array is empty in the data. 🌐 **Wild Exploitation**: None reported.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check your CI4MS version. Is it **0.31.4.0**? 2. Inspect the **Backup Module**. 3. Look for unsanitized file name displays in the UI. 4. Scan for reflected/stored XSS in backup file inputs.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: YES. The vendor released patch **v0.31.5.0**. πŸ”— **Reference**: GitHub Release & Security Advisory (GHSA-qxpq-82f3-xj47). πŸ”„ **Action**: Upgrade immediately to the latest stable version.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Disable Backup Module** if not needed. 2. Implement **WAF Rules** to block XSS payloads in file upload fields. 3. Enforce strict **Input Validation** on file names. 4.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. πŸ“Š **CVSS Score**: High (Vector indicates High Impact on Confidentiality, Integrity, Availability). ⏳ **Priority**: Patch immediately. Account takeover is a critical business risk.…