We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48493

Yii 2 Redis may expose AUTH paramters in logs in case of connection failure



Description

The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.

Reserved 2025-05-22 | Published 2025-06-05 | Updated 2025-06-05 | Assigner GitHub_M


MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:H

Problem types

CWE-532: Insertion of Sensitive Information into Log File

Product status

< 2.0.20
affected

References

github.com/...-redis/security/advisories/GHSA-g3p6-82vc-43jh

github.com/...ommit/962252d2c57c187181e67bb66da3f27b4698358d

cve.org (CVE-2025-48493)

nvd.nist.gov (CVE-2025-48493)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48493

Support options

Helpdesk Chat, Email, Knowledgebase