CVE-2026-25510

CI4MS · CMS Skeleton

An authenticated user with file editor permissions in CI4MS can achieve Remote Code Execution (RCE) by uploading and executing arbitrary PHP code via insecure file endpoints.

Executive summary

CI4MS is vulnerable to a critical Remote Code Execution (RCE) flaw that allows authenticated users to execute arbitrary PHP code and gain full server control.

Vulnerability

The vulnerability exists in the file creation and save endpoints of the CMS. An authenticated attacker with "file editor" permissions can bypass restrictions to create or modify PHP files on the server, leading to code execution.

Business impact

While this requires authentication, the CVSS score of 9.9 indicates that the impact is nearly total. Successful exploitation grants the attacker the ability to execute any command with the privileges of the web server, potentially leading to data exfiltration, installation of persistent backdoors, or lateral movement within the hosting environment.

Remediation

Immediate Action: Update CI4MS to version 0.28.5.0 or later to implement proper security checks on file management operations.

Proactive Monitoring: Review file system changes in the web root for new or modified .php files and audit the activities of users with file editor privileges.

Compensating Controls: Implement strict Role-Based Access Control (RBAC) and disable the file editor functionality in production environments if it is not strictly necessary.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The primary recommendation is to apply the security patch immediately. Additionally, organizations should adopt the principle of least privilege, ensuring only highly trusted administrators have file-editing capabilities, and consider using file integrity monitoring (FIM) tools.