Skip to main content

CVE-2024-58136: CWE-424 Improper Protection of Alternate Path in yiiframework Yii

Critical
VulnerabilityCVE-2024-58136cvecve-2024-58136cwe-424
Published: Thu Apr 10 2025 (04/10/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: yiiframework
Product: Yii

Description

Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.

AI-Powered Analysis

AILast updated: 06/26/2025, 01:29:06 UTC

Technical Analysis

CVE-2024-58136 is a critical vulnerability affecting the Yii framework version 2 prior to 2.0.52. This vulnerability is categorized under CWE-424, which pertains to improper protection of alternate paths. Specifically, the issue arises from the mishandling of behavior attachment defined by an __class array key within the framework. This vulnerability is a regression of a previous flaw identified as CVE-2024-4990 and has been observed to be exploited in the wild between February and April 2025. The vulnerability allows an attacker to manipulate the behavior attachment mechanism, potentially enabling unauthorized code execution or privilege escalation. The CVSS v3.1 score of 9.0 reflects its critical nature, with an attack vector of network (AV:N), requiring high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning successful exploitation could lead to complete system compromise. Although no official patches or mitigation links are currently provided, the vulnerability demands urgent attention due to its severity and active exploitation. Yii is a widely used PHP framework for web application development, and many web applications rely on it for critical business functions. The improper handling of behavior attachment can allow attackers to bypass security controls, inject malicious code, or disrupt application functionality, leading to significant security breaches.

Potential Impact

For European organizations, the impact of CVE-2024-58136 can be substantial. Given Yii's popularity in web development, especially among SMEs and enterprises building custom web applications, exploitation could lead to unauthorized access to sensitive data, data corruption, or complete service disruption. This can affect sectors such as finance, healthcare, e-commerce, and government services, where web applications built on Yii are deployed. The critical nature of the vulnerability means attackers can remotely exploit it without authentication or user interaction, increasing the risk of widespread compromise. Organizations may face data breaches, regulatory penalties under GDPR for loss of personal data, reputational damage, and operational downtime. The changed scope of the vulnerability suggests that exploitation could impact multiple components or services within an application ecosystem, amplifying the damage. Additionally, the regression aspect indicates that organizations that patched the previous CVE-2024-4990 might still be vulnerable if they have not updated to the latest Yii version. The lack of available patches at the time of publication further elevates the risk, requiring organizations to implement interim protective measures.

Mitigation Recommendations

1. Immediate Upgrade: Organizations should prioritize upgrading Yii to version 2.0.52 or later as soon as it becomes available to address this vulnerability. 2. Code Review and Hardening: Review custom behaviors and extensions that utilize the __class array key for attaching behaviors to ensure they do not introduce similar risks. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block suspicious requests targeting behavior attachment mechanisms or unusual payloads that could exploit this vulnerability. 4. Network Segmentation: Limit exposure of web application servers to the internet by placing them behind secure network segments and restricting access to trusted IPs where possible. 5. Monitoring and Logging: Enhance logging around behavior attachment processes and monitor for anomalous activities that could indicate exploitation attempts. 6. Incident Response Preparedness: Prepare incident response plans specific to web application compromises, including forensic readiness to analyze potential exploitation. 7. Vendor Communication: Maintain communication with Yii framework maintainers for timely patch releases and advisories. 8. Temporary Workarounds: If patching is not immediately possible, consider disabling or restricting features that rely heavily on dynamic behavior attachment or applying strict input validation to mitigate exploitation vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb7da

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 1:29:06 AM

Last updated: 8/1/2025, 5:29:28 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats