CVE-2026-25510
Published: 03 February 2026
Description
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.28.5.0, an authenticated user with file editor permissions can achieve Remote Code Execution (RCE) by leveraging the file…
more
creation and save endpoints, an attacker can upload and execute arbitrary PHP code on the server. This issue has been patched in version 0.28.5.0.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates unrestricted upload of dangerous PHP files by validating file inputs to prevent arbitrary code execution.
Requires timely remediation through patching to version 0.28.5.0, eliminating the RCE vulnerability in file creation and save endpoints.
Enforces least privilege to restrict file editor permissions, preventing authenticated users from accessing RCE-capable file upload functions unnecessarily.
Security SummaryAI
CVE-2026-25510 is a remote code execution (RCE) vulnerability in CI4MS, a CodeIgniter 4-based CMS skeleton providing production-ready modular architecture, RBAC authorization, and theme support. Versions prior to 0.28.5.0 are affected, where an authenticated user with file editor permissions can exploit the file creation and save endpoints to upload and execute arbitrary PHP code on the server. The flaw maps to CWE-94 (Code Injection) and CWE-434 (Unrestricted Upload of File with Dangerous Type), earning a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
An attacker must have valid credentials and file editor permissions to exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows remote execution of arbitrary PHP code, enabling high-impact compromise of confidentiality, integrity, and availability across the server's scope due to the changed scope (S:C).
The vulnerability has been patched in CI4MS version 0.28.5.0. Security practitioners should upgrade to this version immediately. Additional mitigation details are available in the GitHub security advisory at https://github.com/ci4-cms-erp/ci4ms/security/advisories/GHSA-gp56-f67f-m4px and the patching commit at https://github.com/ci4-cms-erp/ci4ms/commit/86be2930d1c54eb7575102563302b2f3bafcb653.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
RCE via unrestricted file upload of arbitrary PHP code in a public-facing CMS web application directly enables T1190 (Exploit Public-Facing Application). The low-privilege (file editor) requirement to server-scope compromise facilitates T1068 (Exploitation for Privilege Escalation).