CVE-2026-39394
PHP vulnerability analysis and mitigation

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the Install::index() controller reads the host POST parameter without any validation and passes it directly into updateEnvSettings(), which writes it into the .env file via preg_replace(). Because newline characters in the value are not stripped, an attacker can inject arbitrary configuration directives into the .env file. The install routes have CSRF protection explicitly disabled, and the InstallFilter can be bypassed when cache('settings') is empty (cache expiry or fresh deployment). This vulnerability is fixed in 0.31.4.0.


SourceNVD

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-39394HIGH8.1
  • PHPPHP
  • ci4-cms-erp/ci4ms
NoYesApr 08, 2026
CVE-2026-39393HIGH8.1
  • PHPPHP
  • ci4-cms-erp/ci4ms
NoYesApr 08, 2026
CVE-2026-39976HIGH7.1
  • PHPPHP
  • laravel/passport
NoYesApr 09, 2026
CVE-2026-39392MEDIUM5.5
  • PHPPHP
  • ci4-cms-erp/ci4ms
NoYesApr 08, 2026
CVE-2026-39391MEDIUM4.8
  • PHPPHP
  • ci4-cms-erp/ci4ms
NoYesApr 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management