📦 Codeigniter

by Codeigniter

🔍 What is Codeigniter?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2025-54418

CRITICAL CVSS 9.8 Jul 28, 2025

This CVE describes a command injection vulnerability in CodeIgniter's ImageMagick handler that allows remote code execution. Applications using ImageMagiter with user-controlled filenames or text cont...

CVE-2023-32692

CRITICAL CVSS 9.8 May 30, 2023

CVE-2023-32692 is a critical remote code execution vulnerability in CodeIgniter's Validation library. Attackers can execute arbitrary PHP code by exploiting validation placeholders in form validation ...

CVE-2022-24711

CRITICAL CVSS 9.4 Feb 28, 2022

CVE-2022-24711 is an improper input validation vulnerability in CodeIgniter4 that allows attackers to execute CLI (Command Line Interface) routes via HTTP requests. This affects all CodeIgniter4 insta...

CVE-2024-41344

HIGH CVSS 7.5 Oct 15, 2024

This CSRF vulnerability in CodeIgniter 3.1.13 allows attackers to trick authenticated administrators into unknowingly changing their own passwords. Attackers can then take over administrator accounts ...

CVE-2024-29904

HIGH CVSS 7.5 Mar 29, 2024

A denial-of-service vulnerability in CodeIgniter's Language class allows attackers to trigger excessive memory consumption on servers. This affects all CodeIgniter4 applications using the vulnerable L...

CVE-2023-46240

HIGH CVSS 7.5 Oct 31, 2023

CodeIgniter4 versions before 4.4.3 display detailed error reports in production environments when errors or exceptions occur, potentially leaking sensitive information like database credentials, file ...

CVE-2022-21647

HIGH CVSS 7.7 Jan 4, 2022

CVE-2022-21647 is a deserialization vulnerability in CodeIgniter4's old() function that allows remote attackers to inject arbitrary objects and potentially execute PHP code on the server. This affects...

CVE-2025-24013

MEDIUM CVSS 5.3 Jan 20, 2025

CodeIgniter versions before 4.5.8 lack proper validation for HTTP header names and values, allowing attackers to craft malformed headers. This can disrupt application functionality, cause errors, or g...