An authenticated user with file editor permissions in CI4MS can achieve Remote Code Execution (RCE) by uploading and executing arbitrary PHP code via...
Description
An authenticated user with file editor permissions in CI4MS can achieve Remote Code Execution (RCE) by uploading and executing arbitrary PHP code via insecure file endpoints.
AI Analyst Comment
Remediation
Update Arch Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Description Summary:
An authenticated user with file editor permissions in CI4MS can achieve Remote Code Execution (RCE) by uploading and executing arbitrary PHP code via insecure file endpoints.
Executive Summary:
CI4MS is vulnerable to a critical Remote Code Execution (RCE) flaw that allows authenticated users to execute arbitrary PHP code and gain full server control.
Vulnerability Details
CVE-ID: CVE-2026-25510
Affected Software: CI4MS CMS
Affected Versions: Prior to version 0.28.5.0
Vulnerability: The vulnerability exists in the file creation and save endpoints of the CMS. An authenticated attacker with "file editor" permissions can bypass restrictions to create or modify PHP files on the server, leading to code execution.
Business Impact
While this requires authentication, the CVSS score of 9.9 indicates that the impact is nearly total. Successful exploitation grants the attacker the ability to execute any command with the privileges of the web server, potentially leading to data exfiltration, installation of persistent backdoors, or lateral movement within the hosting environment.
Remediation Plan
Immediate Action: Update CI4MS to version 0.28.5.0 or later to implement proper security checks on file management operations.
Proactive Monitoring: Review file system changes in the web root for new or modified
.phpfiles and audit the activities of users with file editor privileges.Compensating Controls: Implement strict Role-Based Access Control (RBAC) and disable the file editor functionality in production environments if it is not strictly necessary.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Feb 3, 2026, there is no public information indicating active exploitation. The requirement for authentication slightly reduces the risk compared to unauthenticated RCE, but the severity remains critical.
Analyst Recommendation
The primary recommendation is to apply the security patch immediately. Additionally, organizations should adopt the principle of least privilege, ensuring only highly trusted administrators have file-editing capabilities, and consider using file integrity monitoring (FIM) tools.