Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. ci4-cms-erp/ci4ms
  4. ›
  5. CVE-2026-27599

CVE-2026-27599: ci4-cms-erp/ci4ms: System Settings (Mail Settings) Full Platform Compromise & Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS

March 30, 2026 (updated April 27, 2026)

The application fails to properly sanitize user-controlled input within System Settings – Mail Settings. Several configuration fields, including Mail Server, Mail Port, Email Address, Email Password, Mail Protocol, and TLS settings, accept attacker-controlled input that is stored server-side and later rendered without proper output encoding.

Unlike public-facing XSS that executes on landing pages, this vulnerability executes immediately on the same settings page. The injected payload breaks out of the HTML attribute context and is interpreted by the browser when rendered, resulting in same-page DOM-based XSS.

This represents different functionality and a separate vulnerability from landing-page injection.

References

  • github.com/advisories/GHSA-66m2-v9v9-95c3
  • github.com/ci4-cms-erp/ci4ms
  • github.com/ci4-cms-erp/ci4ms/security/advisories/GHSA-66m2-v9v9-95c3
  • mega.nz/file/KRNhUI6Q
  • nvd.nist.gov/vuln/detail/CVE-2026-27599

Code Behaviors & Features

Detect and mitigate CVE-2026-27599 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.31.0.0

Fixed versions

  • 0.31.0.0

Solution

Upgrade to version 0.31.0.0 or above.

Impact 4.7 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

packagist/ci4-cms-erp/ci4ms/CVE-2026-27599.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:36 +0000.