CVE-2026-25510
📋 TL;DR
This vulnerability allows authenticated users with file editor permissions in CI4MS to achieve remote code execution by uploading and executing arbitrary PHP code. It affects CI4MS versions prior to 0.28.5.0, putting any system using vulnerable versions at risk of complete server compromise.
💻 Affected Systems
- CI4MS (CodeIgniter 4-based CMS skeleton)
⚠️ Risk & Real-World Impact
Worst Case
Complete server takeover with attacker gaining full control over the web server, accessing sensitive data, and using the server as a pivot point for further attacks.
Likely Case
Attacker uploads web shell or backdoor, establishes persistent access, and exfiltrates sensitive data from the database and file system.
If Mitigated
Attack prevented by proper access controls and file upload restrictions, limiting impact to unauthorized file uploads without execution.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once file editor permissions are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.28.5.0
Vendor Advisory: https://github.com/ci4-cms-erp/ci4ms/security/advisories/GHSA-gp56-f67f-m4px
Restart Required: No
Instructions:
1. Backup your current installation. 2. Update CI4MS to version 0.28.5.0 or later. 3. Verify the patch is applied by checking the commit 86be2930d1c54eb7575102563302b2f3bafcb653 is present.
🔧 Temporary Workarounds
Restrict File Editor Permissions
allTemporarily remove or restrict file editor permissions from all users until patching can be completed.
Implement File Upload Restrictions
allAdd server-side validation to block PHP file uploads through the file creation endpoints.
🧯 If You Can't Patch
- Immediately revoke file editor permissions from all non-essential users
- Implement web application firewall rules to block PHP file uploads to the affected endpoints
🔍 How to Verify
Check if Vulnerable:
Check if your CI4MS version is below 0.28.5.0 and if file editor permissions are granted to any users.
Check Version:
Check the CI4MS configuration files or admin panel for version information
Verify Fix Applied:
Confirm version is 0.28.5.0 or higher and verify the security patch commit 86be2930d1c54eb7575102563302b2f3bafcb653 is present in your installation.
📡 Detection & Monitoring
Log Indicators:
- Unusual file upload activity to file creation endpoints
- PHP file uploads by users with file editor permissions
- Execution of unexpected PHP files in web directories
Network Indicators:
- POST requests to file creation/save endpoints with PHP content
- Unusual outbound connections from web server after file uploads
SIEM Query:
source="web_server" AND (uri_path="/file/create" OR uri_path="/file/save") AND file_extension="php"