Codeigniter
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Codeigniter.
By the Year
In 2025 there have been 3 vulnerabilities in Codeigniter. Last year, in 2024 Codeigniter had 2 security vulnerabilities published. That is, 1 more vulnerability have already been reported in 2025 as compared to last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2025 | 3 | 0.00 |
| 2024 | 2 | 7.50 |
| 2023 | 2 | 8.65 |
| 2022 | 21 | 8.98 |
| 2021 | 0 | 0.00 |
| 2020 | 1 | 8.80 |
| 2019 | 0 | 0.00 |
| 2018 | 1 | 9.80 |
It may take a day or so for new Codeigniter vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Codeigniter Security Vulnerabilities
CodeIgniter <4.6.2 RCE via ImageMagick Command Injection
CVE-2025-54418
- July 28, 2025
CodeIgniter is a PHP full-stack web framework. A command injection vulnerability present in versions prior to 4.6.2 affects applications that use the ImageMagick handler for image processing (`imagick` as the image library) and either allow file uploads with user-controlled filenames and process uploaded images using the `resize()` method or use the `text()` method with user-controlled text content or options. An attacker can upload a file with a malicious filename containing shell metacharacters that get executed when the image is processed or provide malicious text content or options that get executed when adding text to images Users should upgrade to v4.6.2 or later to receive a patch. As a workaround, switch to the GD image handler (`gd`, the default handler), which is not affected by either vulnerability. For file upload scenarios, instead of using user-provided filenames, generate random names to eliminate the attack vector with `getRandomName()` when using the `move()` method, or use the `store()` method, which automatically generates safe filenames. For text operations, if one must use ImageMagick with user-controlled text, sanitize the input to only allow safe characters and validate/restrict text options.
Shell injection
Stored XSS in CodeIgniter4 v4.6.0 debugbar_time Parameter
CVE-2025-45406
- July 25, 2025
A stored cross-site scripting (XSS) vulnerability in CodeIgniter4 v4.6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the debugbar_time parameter. NOTE: this is disputed by the Supplier because attackers cannot influence the value of debugbar_time, and because debugbar-related data is automatically escaped by the CodeIgniter Parser class.
CodeIgniter Prior 4.5.8 Header Validation Flaw (CVE-2025-24013)
CVE-2025-24013
- January 20, 2025
CodeIgniter is a PHP full-stack web framework. Prior to 4.5.8, CodeIgniter lacked proper header validation for its name and value. The potential attacker can construct deliberately malformed headers with Header class. This could disrupt application functionality, potentially causing errors or generating invalid HTTP requests. In some cases, these malformed requests might lead to a DoS scenario if a remote services web application firewall interprets them as malicious and blocks further communication with the application. This vulnerability is fixed in 4.5.8.
Interpretation Conflict
CSRF in CodeIgniter 3.1.13 Allows Admin Password Reset
CVE-2024-41344
- October 15, 2024
A Cross-Site Request Forgery (CSRF) in Codeigniter 3.1.13 allows attackers to arbitrarily change the Administrator password and escalate privileges.
CodeIgniter 4 DoS via Memory Leak in Language Class (fixed in v4.4.7)
CVE-2024-29904
7.5 - High
- March 29, 2024
CodeIgniter is a PHP full-stack web framework A vulnerability was found in the Language class that allowed DoS attacks. This vulnerability can be exploited by an attacker to consume a large amount of memory on the server. Upgrade to v4.4.7 or later.
Stack Exhaustion
CI4 4.4.x: Production Error Leak via app/Config/Boot/production.php
CVE-2023-46240
7.5 - High
- October 31, 2023
CodeIgniter is a PHP full-stack web framework. Prior to CodeIgniter4 version 4.4.3, if an error or exception occurs, a detailed error report is displayed even if in the production environment. As a result, confidential information may be leaked. Version 4.4.3 contains a patch. As a workaround, replace `ini_set('display_errors', '0')` with `ini_set('display_errors', 'Off')` in `app/Config/Boot/production.php`.
Generation of Error Message Containing Sensitive Information
CodeIgniter is a PHP full-stack web framework
CVE-2023-32692
9.8 - Critical
- May 30, 2023
CodeIgniter is a PHP full-stack web framework. This vulnerability allows attackers to execute arbitrary code when you use Validation Placeholders. The vulnerability exists in the Validation library, and validation methods in the controller and in-model validation are also vulnerable because they use the Validation library internally. This issue is patched in version 4.3.5.
Code Injection
CodeIgniter is a PHP full-stack web framework
CVE-2022-23556
7.5 - High
- December 22, 2022
CodeIgniter is a PHP full-stack web framework. This vulnerability may allow attackers to spoof their IP address when the server is behind a reverse proxy. This issue has been patched, please upgrade to version 4.2.11 or later, and configure `Config\App::$proxyIPs`. As a workaround, do not use `$request->getIPAddress()`.
Insufficient Verification of Data Authenticity
CodeIgniter is a PHP full-stack web framework
CVE-2022-46170
9.8 - Critical
- December 22, 2022
CodeIgniter is a PHP full-stack web framework. When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to `DatabaseHandler`, `MemcachedHandler`, or `RedisHandler`, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). This issue has been patched, please upgrade to version 4.2.11 or later. As a workaround, use only one session cookie.
authentification
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40828
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_where_not_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
SQL Injection
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40824
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_where() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
SQL Injection
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40825
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php where_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
SQL Injection
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40826
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_having() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
SQL Injection
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40827
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php where() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
SQL Injection
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40829
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_like() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
SQL Injection
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40830
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php where_not_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
SQL Injection
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40831
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php like() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
SQL Injection
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40832
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php having() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
SQL Injection
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40833
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_where_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
SQL Injection
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40834
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_not_like() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
SQL Injection
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera
CVE-2022-40835
9.8 - Critical
- October 07, 2022
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php. Note: Multiple third parties have disputed this as not a valid vulnerability
SQL Injection
CodeIgniter is a PHP full-stack web framework
CVE-2022-39284
4.3 - Medium
- October 06, 2022
CodeIgniter is a PHP full-stack web framework. In versions prior to 4.2.7 setting `$secure` or `$httponly` value to `true` in `Config\Cookie` is not reflected in `set_cookie()` or `Response::setCookie()`. As a result cookie values are erroneously exposed to scripts. It should be noted that this vulnerability does not affect session cookies. Users are advised to upgrade to v4.2.7 or later. Users unable to upgrade are advised to manually construct their cookies either by setting the options in code or by constructing Cookie objects. Examples of each workaround are available in the linked GHSA.
Incorrect Permission Assignment for Critical Resource
Shield is an authentication and authorization framework for CodeIgniter 4
CVE-2022-35943
8.8 - High
- August 12, 2022
Shield is an authentication and authorization framework for CodeIgniter 4. This vulnerability may allow [SameSite Attackers](https://canitakeyoursubdomain.name/) to bypass the [CodeIgniter4 CSRF protection](https://codeigniter4.github.io/userguide/libraries/security.html) mechanism with CodeIgniter Shield. For this attack to succeed, the attacker must have direct (or indirect, e.g., XSS) control over a subdomain site (e.g., `https://a.example.com/`) of the target site (e.g., `http://example.com/`). Upgrade to **CodeIgniter v4.2.3 or later** and **Shield v1.0.0-beta.2 or later**. As a workaround: set `Config\Security::$csrfProtection` to `'session,'`remove old session data right after login (immediately after ID and password match) and regenerate CSRF token right after login (immediately after ID and password match)
Session Riding
Bootstrap v3.1.11 and v3.3.7 was discovered to contain a cross-site scripting (XSS) vulnerability
CVE-2022-26624
6.1 - Medium
- April 08, 2022
Bootstrap v3.1.11 and v3.3.7 was discovered to contain a cross-site scripting (XSS) vulnerability via the Title parameter in /vendor/views/add_product.php.
XSS
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework
CVE-2022-24711
9.8 - Critical
- February 28, 2022
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. Prior to version 4.1.9, an improper input validation vulnerability allows attackers to execute CLI routes via HTTP request. Version 4.1.9 contains a patch. There are currently no known workarounds for this vulnerability.
Improper Input Validation
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework
CVE-2022-24712
8.8 - High
- February 28, 2022
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A vulnerability in versions prior to 4.1.9 might allow remote attackers to bypass the CodeIgniter4 Cross-Site Request Forgery (CSRF) protection mechanism. Users should upgrade to version 4.1.9. There are workarounds for this vulnerability, but users will still need to code as these after upgrading to v4.1.9. Otherwise, the CSRF protection may be bypassed. If auto-routing is enabled, check the request method in the controller method before processing. If auto-routing is disabled, either avoid using `$routes->add()` and instead use HTTP verbs in routes; or check the request method in the controller method before processing.
Session Riding
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework
CVE-2022-21715
6.1 - Medium
- January 24, 2022
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A cross-site scripting (XSS) vulnerability was found in `API\ResponseTrait` in Codeigniter4 prior to version 4.1.8. Attackers can do XSS attacks if a potential victim is using `API\ResponseTrait`. Version 4.1.8 contains a patch for this vulnerability. There are two potential workarounds available. Users may avoid using `API\ResponseTrait` or `ResourceController` Users may also disable Auto Route and use defined routes only.
XSS
CodeIgniter is an open source PHP full-stack web framework
CVE-2022-21647
9.8 - Critical
- January 04, 2022
CodeIgniter is an open source PHP full-stack web framework. Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. Users are advised to upgrade to v4.1.6 or later. Users unable to upgrade as advised to not use the `old()` function and form_helper nor `RedirectResponse::withInput()` and `redirect()->withInput()`.
Marshaling, Unmarshaling
CodeIgniter through 4.0.0 allows remote attackers to gain privileges via a modified Email ID to the "Select Role of the User" page
CVE-2020-10793
8.8 - High
- March 23, 2020
CodeIgniter through 4.0.0 allows remote attackers to gain privileges via a modified Email ID to the "Select Role of the User" page. NOTE: A contributor to the CodeIgniter framework argues that the issue should not be attributed to CodeIgniter. Furthermore, the blog post reference shows an unknown website built with the CodeIgniter framework but that CodeIgniter is not responsible for introducing this issue because the framework has never provided a login screen, nor any kind of login or user management facilities beyond a Session library. Also, another reporter indicates the issue is with a custom module/plugin to CodeIgniter, not CodeIgniter itself.
Improper Privilege Management
A Session Fixation issue exists in CodeIgniter before 3.1.9
CVE-2018-12071
9.8 - Critical
- June 17, 2018
A Session Fixation issue exists in CodeIgniter before 3.1.9 because session.use_strict_mode in the Session Library was mishandled.
Session Fixation
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Codeigniter or by Codeigniter? Click the Watch button to subscribe.