| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vfhx-5459-qhqh | CI4MS Vulnerable to .env CRLF Injection via Unvalidated `host` Parameter in Install Controller |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ci4-cms-erp
Ci4-cms-erp ci4ms |
|
| Vendors & Products |
Ci4-cms-erp
Ci4-cms-erp ci4ms |
Wed, 08 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the Install::index() controller reads the host POST parameter without any validation and passes it directly into updateEnvSettings(), which writes it into the .env file via preg_replace(). Because newline characters in the value are not stripped, an attacker can inject arbitrary configuration directives into the .env file. The install routes have CSRF protection explicitly disabled, and the InstallFilter can be bypassed when cache('settings') is empty (cache expiry or fresh deployment). This vulnerability is fixed in 0.31.4.0. | |
| Title | CI4MS has an .env CRLF Injection via Unvalidated `host` Parameter in Install Controller | |
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T16:13:10.966Z
Reserved: 2026-04-06T22:06:40.516Z
Link: CVE-2026-39394
Updated: 2026-04-08T16:09:19.720Z
Status : Awaiting Analysis
Published: 2026-04-08T15:16:14.360
Modified: 2026-04-08T21:26:13.410
Link: CVE-2026-39394
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:39:16Z
Github GHSA