Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. ci4-cms-erp/ci4ms
  4. ›
  5. CVE-2026-39394

CVE-2026-39394: CI4MS Vulnerable to .env CRLF Injection via Unvalidated `host` Parameter in Install Controller

April 8, 2026

The Install::index() controller reads the host POST parameter without any validation and passes it directly into updateEnvSettings(), which writes it into the .env file via preg_replace(). Because newline characters in the value are not stripped, an attacker can inject arbitrary configuration directives into the .env file. The install routes have CSRF protection explicitly disabled, and the InstallFilter can be bypassed when cache('settings') is empty (cache expiry or fresh deployment).

References

  • github.com/advisories/GHSA-vfhx-5459-qhqh
  • github.com/ci4-cms-erp/ci4ms
  • github.com/ci4-cms-erp/ci4ms/releases/tag/0.31.4.0
  • github.com/ci4-cms-erp/ci4ms/security/advisories/GHSA-vfhx-5459-qhqh
  • nvd.nist.gov/vuln/detail/CVE-2026-39394

Code Behaviors & Features

Detect and mitigate CVE-2026-39394 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.31.4.0

Fixed versions

  • 0.31.4.0

Solution

Upgrade to version 0.31.4.0 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')

Source file

packagist/ci4-cms-erp/ci4ms/CVE-2026-39394.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:50 +0000.