CVE-2025-48493

The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yiiframework:yii2-redis:*:*:*:*:*:*:*:*

History

18 Sep 2025, 14:08

Type Values Removed Values Added
First Time Yiiframework yii2-redis
Yiiframework
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:yiiframework:yii2-redis:*:*:*:*:*:*:*:*
References () https://github.com/yiisoft/yii2-redis/commit/962252d2c57c187181e67bb66da3f27b4698358d - () https://github.com/yiisoft/yii2-redis/commit/962252d2c57c187181e67bb66da3f27b4698358d - Patch
References () https://github.com/yiisoft/yii2-redis/security/advisories/GHSA-g3p6-82vc-43jh - () https://github.com/yiisoft/yii2-redis/security/advisories/GHSA-g3p6-82vc-43jh - Vendor Advisory

05 Jun 2025, 20:12

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-05 17:15

Updated : 2025-09-18 14:08


NVD link : CVE-2025-48493

Mitre link : CVE-2025-48493

CVE.ORG link : CVE-2025-48493


JSON object : View

Products Affected

yiiframework

  • yii2-redis
CWE
CWE-532

Insertion of Sensitive Information into Log File