First published: Tue Nov 14 2023(Updated: )
### Impact Affected versions of `yiisoft/yii` are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. ### Patches Upgrade `yiisoft/yii` to version 1.1.29 or higher. ### For more information See the following links for more details: - [Git commit](https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06) - https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection If you have any questions or comments about this advisory, [contact us through security form](https://www.yiiframework.com/security).
Affected Software | Affected Version | How to fix |
---|---|---|
composer/yiisoft/yii | <1.1.29 | 1.1.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of vulnerability GHSA-mw2w-2hj2-fg8q is high with a severity value of 8.1.
Vulnerability GHSA-mw2w-2hj2-fg8q allows remote code execution (RCE) if the application calls 'unserialize()' on arbitrary user input.
To fix vulnerability GHSA-mw2w-2hj2-fg8q, you need to upgrade 'yiisoft/yii' to version 1.1.29 or higher.
The CVE ID for vulnerability GHSA-mw2w-2hj2-fg8q is CVE-2023-47130.
You can find more information about vulnerability GHSA-mw2w-2hj2-fg8q in the following links: - [GitHub Advisory](https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q) - [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-47130) - [GitHub Commit](https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06)