CISA KEV 정보
| 취약점명 | Yiiframework Yii Improper Protection of Alternate Path Vulnerability |
|---|---|
| 설명 | Yii Framework contains an improper protection of alternate path vulnerability that may allow a remote attacker to execute arbitrary code. This vulnerability could affect other products that implement Yii, including—but not limited to—Craft CMS, as represented by CVE-2025-32432. |
| 조치사항 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-424 |
| 등록일 (KEV) | 2025-05-02 |
| 조치 기한 | 2025-05-23 |
| 추가 참고 | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.yiiframework.com/news/709/please-upgrade-to-yii-2-0-52 ; https://nvd.nist.gov/vuln/detail/CVE-2024-58136 |
NVD 상세 정보
CVSS v3.1: 9.0 CRITICAL
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H설명: Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.
CWE: CWE-424
참조
- https://github.com/yiisoft/yii2/commit/40fe496eda529fd1d933b56a1022ec32d3cd0b12 [Patch]
- https://github.com/yiisoft/yii2/compare/2.0.51...2.0.52 [Issue Tracking]
- https://github.com/yiisoft/yii2/pull/20232 [Patch]
- https://github.com/yiisoft/yii2/pull/20232#issuecomment-2252459709 [Issue Tracking]
- https://www.yiiframework.com/news/709/please-upgrade-to-yii-2-0-52 [Vendor Advisory]
- https://sensepost.com/blog/2025/investigating-an-in-the-wild-campaign-using-rce-in-craftcms/ [Exploit, Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-58136 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.