The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.
References
Configurations
History
18 Sep 2025, 14:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:yiiframework:yii2-redis:*:*:*:*:*:*:*:* | |
Summary |
|
|
First Time |
Yiiframework
Yiiframework yii2-redis |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://github.com/yiisoft/yii2-redis/commit/962252d2c57c187181e67bb66da3f27b4698358d - Patch | |
References | () https://github.com/yiisoft/yii2-redis/security/advisories/GHSA-g3p6-82vc-43jh - Vendor Advisory |
05 Jun 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-05 17:15
Updated : 2025-09-18 14:08
NVD link : CVE-2025-48493
Mitre link : CVE-2025-48493
CVE.ORG link : CVE-2025-48493
JSON object : View
Products Affected
yiiframework
- yii2-redis
CWE
CWE-532
Insertion of Sensitive Information into Log File