9 CVE-2024-58136

CISA Kev Catalog Patch Exploit
 

Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.
https://nvd.nist.gov/vuln/detail/CVE-2024-58136

Categories

CWE-424 : Improper Protection of Alternate Path
The product does not sufficiently protect all possible paths that a user can take to access restricted functionality or resources. Deploy different layers of protection to implement security in depth. Access-control setting in web-based document collaboration tool is not properly implemented by the code, which prevents listing hidden directories but does not prevent direct requests to files in those directories.

CWE-NVD-Other

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:* < 2.0.52


REMEDIATION


Patch

Url
https://github.com/yiisoft/yii2/commit/40fe496eda529fd1d933b56a1022ec32d3cd0b12
https://github.com/yiisoft/yii2/pull/20232


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://sensepost.com/blog/2025/investigating-an-in-the-wild-campaign-using-r...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
127 Directory Indexing
Medium
554 Functionality Bypass
High


MITRE


Techniques

id description
T1083 File and Directory Discovery
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.