The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Thu, 18 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Yiiframework
Yiiframework yii2-redis |
|
CPEs | cpe:2.3:a:yiiframework:yii2-redis:*:*:*:*:*:*:*:* | |
Vendors & Products |
Yiiframework
Yiiframework yii2-redis |
|
Metrics |
cvssV3_1
|
Mon, 09 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 05 Jun 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue. | |
Title | Yii 2 Redis may expose AUTH paramters in logs in case of connection failure | |
Weaknesses | CWE-532 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-05T16:33:20.330Z
Updated: 2025-06-09T20:52:45.538Z
Reserved: 2025-05-22T12:11:39.121Z
Link: CVE-2025-48493

Updated: 2025-06-09T20:52:40.614Z

Status : Analyzed
Published: 2025-06-05T17:15:29.377
Modified: 2025-09-18T14:08:53.603
Link: CVE-2025-48493

No data.