Codeigniter Codeigniter

Do you want an email whenever new security vulnerabilities are reported in Codeigniter?

By the Year

In 2024 there have been 0 vulnerabilities in Codeigniter . Last year Codeigniter had 2 security vulnerabilities published. Right now, Codeigniter is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 2 8.65
2022 21 8.98
2021 0 0.00
2020 1 8.80
2019 0 0.00
2018 1 9.80

It may take a day or so for new Codeigniter vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Codeigniter Security Vulnerabilities

CodeIgniter is a PHP full-stack web framework

CVE-2023-46240 7.5 - High - October 31, 2023

CodeIgniter is a PHP full-stack web framework. Prior to CodeIgniter4 version 4.4.3, if an error or exception occurs, a detailed error report is displayed even if in the production environment. As a result, confidential information may be leaked. Version 4.4.3 contains a patch. As a workaround, replace `ini_set('display_errors', '0')` with `ini_set('display_errors', 'Off')` in `app/Config/Boot/production.php`.

Generation of Error Message Containing Sensitive Information

CodeIgniter is a PHP full-stack web framework

CVE-2023-32692 9.8 - Critical - May 30, 2023

CodeIgniter is a PHP full-stack web framework. This vulnerability allows attackers to execute arbitrary code when you use Validation Placeholders. The vulnerability exists in the Validation library, and validation methods in the controller and in-model validation are also vulnerable because they use the Validation library internally. This issue is patched in version 4.3.5.

Code Injection

CodeIgniter is a PHP full-stack web framework

CVE-2022-23556 7.5 - High - December 22, 2022

CodeIgniter is a PHP full-stack web framework. This vulnerability may allow attackers to spoof their IP address when the server is behind a reverse proxy. This issue has been patched, please upgrade to version 4.2.11 or later, and configure `Config\App::$proxyIPs`. As a workaround, do not use `$request->getIPAddress()`.

Insufficient Verification of Data Authenticity

CodeIgniter is a PHP full-stack web framework

CVE-2022-46170 9.8 - Critical - December 22, 2022

CodeIgniter is a PHP full-stack web framework. When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to `DatabaseHandler`, `MemcachedHandler`, or `RedisHandler`, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). This issue has been patched, please upgrade to version 4.2.11 or later. As a workaround, use only one session cookie.

authentification

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40831 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php like() function.

SQL Injection

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40824 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_where() function.

SQL Injection

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40825 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php where_in() function.

SQL Injection

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40826 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_having() function.

SQL Injection

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40827 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php where() function.

SQL Injection

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40828 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_where_not_in() function.

SQL Injection

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40829 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_like() function.

SQL Injection

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40830 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php where_not_in() function.

SQL Injection

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40832 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php having() function.

SQL Injection

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40833 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_where_in() function.

SQL Injection

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40834 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_not_like() function.

SQL Injection

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnera

CVE-2022-40835 9.8 - Critical - October 07, 2022

B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php.

SQL Injection

CodeIgniter is a PHP full-stack web framework

CVE-2022-39284 4.3 - Medium - October 06, 2022

CodeIgniter is a PHP full-stack web framework. In versions prior to 4.2.7 setting `$secure` or `$httponly` value to `true` in `Config\Cookie` is not reflected in `set_cookie()` or `Response::setCookie()`. As a result cookie values are erroneously exposed to scripts. It should be noted that this vulnerability does not affect session cookies. Users are advised to upgrade to v4.2.7 or later. Users unable to upgrade are advised to manually construct their cookies either by setting the options in code or by constructing Cookie objects. Examples of each workaround are available in the linked GHSA.

Incorrect Permission Assignment for Critical Resource

Shield is an authentication and authorization framework for CodeIgniter 4

CVE-2022-35943 8.8 - High - August 12, 2022

Shield is an authentication and authorization framework for CodeIgniter 4. This vulnerability may allow [SameSite Attackers](https://canitakeyoursubdomain.name/) to bypass the [CodeIgniter4 CSRF protection](https://codeigniter4.github.io/userguide/libraries/security.html) mechanism with CodeIgniter Shield. For this attack to succeed, the attacker must have direct (or indirect, e.g., XSS) control over a subdomain site (e.g., `https://a.example.com/`) of the target site (e.g., `http://example.com/`). Upgrade to **CodeIgniter v4.2.3 or later** and **Shield v1.0.0-beta.2 or later**. As a workaround: set `Config\Security::$csrfProtection` to `'session,'`remove old session data right after login (immediately after ID and password match) and regenerate CSRF token right after login (immediately after ID and password match)

Session Riding

Bootstrap v3.1.11 and v3.3.7 was discovered to contain a cross-site scripting (XSS) vulnerability

CVE-2022-26624 6.1 - Medium - April 08, 2022

Bootstrap v3.1.11 and v3.3.7 was discovered to contain a cross-site scripting (XSS) vulnerability via the Title parameter in /vendor/views/add_product.php.

XSS

CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework

CVE-2022-24711 9.8 - Critical - February 28, 2022

CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. Prior to version 4.1.9, an improper input validation vulnerability allows attackers to execute CLI routes via HTTP request. Version 4.1.9 contains a patch. There are currently no known workarounds for this vulnerability.

Improper Input Validation

CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework

CVE-2022-24712 8.8 - High - February 28, 2022

CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A vulnerability in versions prior to 4.1.9 might allow remote attackers to bypass the CodeIgniter4 Cross-Site Request Forgery (CSRF) protection mechanism. Users should upgrade to version 4.1.9. There are workarounds for this vulnerability, but users will still need to code as these after upgrading to v4.1.9. Otherwise, the CSRF protection may be bypassed. If auto-routing is enabled, check the request method in the controller method before processing. If auto-routing is disabled, either avoid using `$routes->add()` and instead use HTTP verbs in routes; or check the request method in the controller method before processing.

Session Riding

CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework

CVE-2022-21715 6.1 - Medium - January 24, 2022

CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A cross-site scripting (XSS) vulnerability was found in `API\ResponseTrait` in Codeigniter4 prior to version 4.1.8. Attackers can do XSS attacks if a potential victim is using `API\ResponseTrait`. Version 4.1.8 contains a patch for this vulnerability. There are two potential workarounds available. Users may avoid using `API\ResponseTrait` or `ResourceController` Users may also disable Auto Route and use defined routes only.

XSS

CodeIgniter is an open source PHP full-stack web framework

CVE-2022-21647 9.8 - Critical - January 04, 2022

CodeIgniter is an open source PHP full-stack web framework. Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. Users are advised to upgrade to v4.1.6 or later. Users unable to upgrade as advised to not use the `old()` function and form_helper nor `RedirectResponse::withInput()` and `redirect()->withInput()`.

Marshaling, Unmarshaling

CodeIgniter through 4.0.0 allows remote attackers to gain privileges via a modified Email ID to the "Select Role of the User" page

CVE-2020-10793 8.8 - High - March 23, 2020

CodeIgniter through 4.0.0 allows remote attackers to gain privileges via a modified Email ID to the "Select Role of the User" page. NOTE: A contributor to the CodeIgniter framework argues that the issue should not be attributed to CodeIgniter. Furthermore, the blog post reference shows an unknown website built with the CodeIgniter framework but that CodeIgniter is not responsible for introducing this issue because the framework has never provided a login screen, nor any kind of login or user management facilities beyond a Session library. Also, another reporter indicates the issue is with a custom module/plugin to CodeIgniter, not CodeIgniter itself.

Improper Privilege Management

A Session Fixation issue exists in CodeIgniter before 3.1.9

CVE-2018-12071 9.8 - Critical - June 17, 2018

A Session Fixation issue exists in CodeIgniter before 3.1.9 because session.use_strict_mode in the Session Library was mishandled.

Session Fixation

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Codeigniter or by Codeigniter? Click the Watch button to subscribe.

Codeigniter
Vendor

Codeigniter
Product

subscribe