CVE-2024-58136

KEV
Published: Apr 10, 2025 Last Modified: Nov 05, 2025
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,0
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: changed
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,7844
Percentile
1,0th
Updated

EPSS Score Trend (Last 90 Days)

424

Improper Protection of Alternate Path

Draft
Common Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Bypass Protection Mechanism Gain Privileges Or Assume Identity
Applicable Platforms
Technologies: Not Technology-Specific, Web Based
View CWE Details
Application

Yii by Yiiframework

Version Range Affected
To 2.0.52 (exclusive)
cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://sensepost.com/blog/2025/investigating-an-in-the-wild-campaign-using-rce…
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024…
https://github.com/yiisoft/yii2/commit/40fe496eda529fd1d933b56a1022ec32d3cd0b12
https://github.com/yiisoft/yii2/compare/2.0.51...2.0.52
https://github.com/yiisoft/yii2/pull/20232
https://github.com/yiisoft/yii2/pull/20232#issuecomment-2252459709
https://www.yiiframework.com/news/709/please-upgrade-to-yii-2-0-52