The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.
History

Thu, 18 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Yiiframework
Yiiframework yii2-redis
CPEs cpe:2.3:a:yiiframework:yii2-redis:*:*:*:*:*:*:*:*
Vendors & Products Yiiframework
Yiiframework yii2-redis
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Mon, 09 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Jun 2025 16:45:00 +0000

Type Values Removed Values Added
Description The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.
Title Yii 2 Redis may expose AUTH paramters in logs in case of connection failure
Weaknesses CWE-532
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-06-05T16:33:20.330Z

Updated: 2025-06-09T20:52:45.538Z

Reserved: 2025-05-22T12:11:39.121Z

Link: CVE-2025-48493

cve-icon Vulnrichment

Updated: 2025-06-09T20:52:40.614Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-05T17:15:29.377

Modified: 2025-09-18T14:08:53.603

Link: CVE-2025-48493

cve-icon Redhat

No data.