CVE-2026-41201

Arch · CI4MS

CI4MS contains a stored DOM-based XSS vulnerability in the backup module that can be leveraged for full account takeover.

Executive summary

A stored DOM XSS vulnerability in CI4MS allows attackers to perform full account takeover and privilege escalation.

Vulnerability

An attacker can upload a crafted SQL file containing a malicious filename that triggers stored DOM XSS when processed by the backup module. This allows for the execution of arbitrary JavaScript in the context of an administrator's session.

Business impact

The ability to execute JavaScript in an administrator's browser leads directly to account takeover and full control over the CMS. Given the 9.1 CVSS score, this is a critical threat to the integrity and availability of the managed content and infrastructure.

Remediation

Immediate Action: Update CI4MS to version 0.31.5.0 immediately.

Proactive Monitoring: Monitor application logs for suspicious file uploads or unusual backup module activity.

Compensating Controls: Implement strict file type and name validation on the server side and utilize a Content Security Policy (CSP) to mitigate the impact of XSS attacks.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Administrators must update to the patched version immediately. Additionally, verify that all existing backup files are clean and that no malicious payloads have already been stored.