CVE-2025-48493: Yii 2 Redis may expose AUTH paramters in logs in case of connection failure

5.1 CVSS

Description

The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.

Classification

CVE ID: CVE-2025-48493

CVSS Base Severity: MEDIUM

CVSS Base Score: 5.1

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:H

Problem Types

CWE-532: Insertion of Sensitive Information into Log File

Affected Products

Vendor: yiisoft

Product: yii2-redis

References

https://nvd.nist.gov/vuln/detail/CVE-2025-48493
https://github.com/yiisoft/yii2-redis/security/advisories/GHSA-g3p6-82vc-43jh
https://github.com/yiisoft/yii2-redis/commit/962252d2c57c187181e67bb66da3f27b4698358d

Timeline