⚠️ CISA Known Exploited Vulnerability
Active ThreatThis vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. Active exploitation has been observed in the wild. This poses significant risk to federal enterprises and should be prioritized for immediate patching.
CVE-2024-58136
Critical CISA KEVVulnerability Description
Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Known Affected Software
66 configuration(s) from 1 vendor(s)
cpe:2.3:a:yiiframework:yii:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.13.3:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.39:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.13.2:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.21:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.48:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.24:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.27:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.42.1:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.29:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.46:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.16:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.28:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.16.1:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.23:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.12.1:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.31:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.41.1:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.13.1:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.18:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.42:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.40:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.22:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.39.2:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.49.3:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.12.2:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.17:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.39.3:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.25:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.47:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.39.1:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.14.2:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.37:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.43:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.19:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.32:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.34:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.30:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.15.1:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.20:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.45:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.41:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.14:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.35:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.38:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.14.1:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.11.2:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.36:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.44:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.33:*:*:*:*:*:*:*
cpe:2.3:a:yiiframework:yii:2.0.26:*:*:*:*:*:*:*
References & Resources
-
https://github.com/yiisoft/yii2/commit/40fe496eda529fd1d933b56a1022ec32d3cd0b12cve@mitre.org Patch
-
https://github.com/yiisoft/yii2/compare/2.0.51...2.0.52cve@mitre.org Issue Tracking
-
https://github.com/yiisoft/yii2/pull/20232cve@mitre.org Patch
-
https://github.com/yiisoft/yii2/pull/20232#issuecomment-2252459709cve@mitre.org Issue Tracking
-
https://www.yiiframework.com/news/709/please-upgrade-to-yii-2-0-52cve@mitre.org Vendor Advisory
-
https://sensepost.com/blog/2025/investigating-an-in-the-wild-campaign-using-rce-in-craftcms/134c704f-9b21-4f2e-91b3-4a467353bcc0 Exploit Third Party Advisory
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-58136134c704f-9b21-4f2e-91b3-4a467353bcc0 US Government Resource
Severity Details
CISA KEV Status
Listed in CISA's Known Exploited Vulnerabilities catalog
Key Information
- Published Date
- April 10, 2025
