GHSA-rpjr-985c-qhvm

Suggest an improvement
Source
https://github.com/advisories/GHSA-rpjr-985c-qhvm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-rpjr-985c-qhvm/GHSA-rpjr-985c-qhvm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rpjr-985c-qhvm
Aliases
Published
2026-04-01T00:10:00Z
Modified
2026-04-01T00:19:36.618431Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L CVSS Calculator
Summary
CI4MS: Permissions Management Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS
Details

Summary

Vulnerability: Stored DOM XSS via Group / Role Management Fields (Administrative Context Execution)

  • Stored Cross-Site Scripting via Unsanitized Group / Role Management Inputs

Description

The application fails to properly sanitize user-controlled input within group and role management functionality. Multiple input fields (three distinct group-related fields) can be injected with malicious JavaScript payloads, which are then stored server-side.

These stored payloads are later rendered unsafely within privileged administrative views without proper output encoding, leading to stored cross-site scripting (XSS) within the role and permission management context.

Affected Functionality

  • Group creation and editing functionality
  • Role and permission assignment interfaces
  • Storage and retrieval of group-related data

Attack Scenario

  • An attacker injects a malicious XSS payload into one or more group-related input fields.
  • The application stores these values without sanitization or encoding.
  • An administrator views the group or role management interface.
  • The payload executes automatically in the administrator’s browser.

Impact

  • Persistent Stored XSS
  • Execution of arbitrary JavaScript in victims’ browsers
  • Privilege escalation when viewed by administrators
  • Full administrator account takeover
  • Full compromise of the entire application

Endpoints: - /backend/users/groupList/

Steps To Reproduce (POC)

  1. Navigate to the Group / Role Management page
  2. Insert an XSS payload into any of the three group-related input fields such as: <img src=x onerror=alert(document.domain)>
  3. Save the group or role changes
  4. View the group/role management page as an administrator
  5. Observe the XSS payload executing automatically

Remediation

  • Never use .html() again or any innerHTML-style like JS in your PHP, or any other sink, even if user inputs that flow into them are not clear, they still represent real world danger as an attacker can make use of this to exploit the application via XSS. And do HTML Encoding as much as possible and always do Sanitization, theres no sanitization there unfortunately. Also apply CSP, HttpOnly, SameSite, and Secure upon all application, they reduce severity of XSS & escalated-CSRF via XSS and do great jobs

Ready Video POC:

https://mega.nz/file/6QUEXDbR#JXzYXg9bef_NeSUVFB4R03UeXLtAVtYwTRsdrHLlokU

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "github_reviewed_at": "2026-04-01T00:10:00Z",
    "nvd_published_at": "2026-03-30T21:17:10Z",
    "severity": "CRITICAL",
    "github_reviewed": true
}
References

Affected packages

Packagist / ci4-cms-erp/ci4ms

Package

Name
ci4-cms-erp/ci4ms
Purl
pkg:composer/ci4-cms-erp/ci4ms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.31.0.0

Affected versions

0.*
0.21.0
0.21.1
0.21.2
0.21.3
0.21.3.1
0.21.3.2
0.21.3.3
0.21.3.4
0.21.3.5
0.21.3.6
0.21.3.7
0.23.0.0
0.23.0.1
0.23.0.2
0.23.1.0
0.24.0.0
0.24.0.16
0.24.0.18
0.24.0.19
0.24.0.20
0.24.0.27
0.24.0.42
0.24.0.45
0.24.0.60
0.25.0.0
0.25.0.1
0.25.0.2
0.25.0.30
0.25.0.39
0.25.0.43
0.25.1.0
0.25.2.0
0.25.3.0
0.26.0.0
0.26.1.0
0.26.2.0
0.26.3.0
0.26.3.1
0.26.3.2
0.26.3.3
0.26.3.4
0.27.0.0
0.28.0.0
0.28.3.0
0.28.4.0
0.28.5.0
0.28.6.0

Database specific

last_known_affected_version_range
"<= 0.28.6.0"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-rpjr-985c-qhvm/GHSA-rpjr-985c-qhvm.json"