Miggo Logo

CVE-2023-26750: Withdrawn: SQL injection in Yii 2

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.91437%
Published
4/4/2023
Updated
2/13/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
yiisoft/yii2composer< 2.0.472.0.47

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis focuses on the function explicitly called out in all vulnerability descriptions (runAction) despite the framework maintainers' dispute. Runtime detection would see this controller method in the call stack when processing attacker-controlled parameters that flow into SQL queries. The function's role as a parameter receiver makes it a key indicator even if the actual injection occurs deeper in application-specific code that uses these parameters.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Wit**r*wn **visory T*is **visory **s ***n wit**r*wn ****us* t** issu* ori*in*t*s *rom * pro*u*t *uilt on Yii*, not t** Yii* *r*m*work its*l*. T*is link is m*int*in** to pr*s*rv* *xt*rn*l r***r*n**s. ## Ori*in*l **s*ription SQL inj**tion vuln*r**i

Reasoning

T** *n*lysis *o*us*s on t** *un*tion *xpli*itly **ll** out in *ll vuln*r**ility **s*riptions (`run**tion`) **spit* t** *r*m*work m*int*in*rs' *isput*. Runtim* **t**tion woul* s** t*is *ontroll*r m*t*o* in t** **ll st**k w**n pro**ssin* *tt**k*r-*ontr