Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2025-2690", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "state": "PUBLISHED", "assignerShortName": "VulDB", "dateReserved": "2025-03-23T09:36:29.048Z", "datePublished": "2025-03-24T07:31:04.253Z", "dateUpdated": "2025-03-24T12:14:34.960Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB", "dateUpdated": "2025-03-24T07:31:04.253Z"}, "title": "yiisoft Yii2 MockClass.php generate deserialization", "problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-502", "lang": "en", "description": "Deserialization"}]}, {"descriptions": [{"type": "CWE", "cweId": "CWE-20", "lang": "en", "description": "Improper Input Validation"}]}], "affected": [{"vendor": "yiisoft", "product": "Yii2", "versions": [{"version": "2.0.0", "status": "affected"}, {"version": "2.0.1", "status": "affected"}, {"version": "2.0.2", "status": "affected"}, {"version": "2.0.3", "status": "affected"}, {"version": "2.0.4", "status": "affected"}, {"version": "2.0.5", "status": "affected"}, {"version": "2.0.6", "status": "affected"}, {"version": "2.0.7", "status": "affected"}, {"version": "2.0.8", "status": "affected"}, {"version": "2.0.9", "status": "affected"}, {"version": "2.0.10", "status": "affected"}, {"version": "2.0.11", "status": "affected"}, {"version": "2.0.12", "status": "affected"}, {"version": "2.0.13", "status": "affected"}, {"version": "2.0.14", "status": "affected"}, {"version": "2.0.15", "status": "affected"}, {"version": "2.0.16", "status": "affected"}, {"version": "2.0.17", "status": "affected"}, {"version": "2.0.18", "status": "affected"}, {"version": "2.0.19", "status": "affected"}, {"version": "2.0.20", "status": "affected"}, {"version": "2.0.21", "status": "affected"}, {"version": "2.0.22", "status": "affected"}, {"version": "2.0.23", "status": "affected"}, {"version": "2.0.24", "status": "affected"}, {"version": "2.0.25", "status": "affected"}, {"version": "2.0.26", "status": "affected"}, {"version": "2.0.27", "status": "affected"}, {"version": "2.0.28", "status": "affected"}, {"version": "2.0.29", "status": "affected"}, {"version": "2.0.30", "status": "affected"}, {"version": "2.0.31", "status": "affected"}, {"version": "2.0.32", "status": "affected"}, {"version": "2.0.33", "status": "affected"}, {"version": "2.0.34", "status": "affected"}, {"version": "2.0.35", "status": "affected"}, {"version": "2.0.36", "status": "affected"}, {"version": "2.0.37", "status": "affected"}, {"version": "2.0.38", "status": "affected"}, {"version": "2.0.39", "status": "affected"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, was found in yiisoft Yii2 up to 2.0.39. This affects the function Generate of the file phpunit\\src\\Framework\\MockObject\\MockClass.php. The manipulation leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."}, {"lang": "de", "value": "Es wurde eine kritische Schwachstelle in yiisoft Yii2 bis 2.0.39 gefunden. Hiervon betroffen ist die Funktion Generate der Datei phpunit\\src\\Framework\\MockObject\\MockClass.php. Durch Manipulation mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."}], "metrics": [{"cvssV4_0": {"version": "4.0", "baseScore": 5.3, "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "baseSeverity": "MEDIUM"}}, {"cvssV3_1": {"version": "3.1", "baseScore": 6.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseSeverity": "MEDIUM"}}, {"cvssV3_0": {"version": "3.0", "baseScore": 6.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseSeverity": "MEDIUM"}}, {"cvssV2_0": {"version": "2.0", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "timeline": [{"time": "2025-03-23T00:00:00.000Z", "lang": "en", "value": "Advisory disclosed"}, {"time": "2025-03-23T01:00:00.000Z", "lang": "en", "value": "VulDB entry created"}, {"time": "2025-03-23T10:41:34.000Z", "lang": "en", "value": "VulDB entry last update"}], "credits": [{"lang": "en", "value": "gaorenyusi (VulDB User)", "type": "reporter"}], "references": [{"url": "https://vuldb.com/?id.300711", "name": "VDB-300711 | yiisoft Yii2 MockClass.php generate deserialization", "tags": ["vdb-entry", "technical-description"]}, {"url": "https://vuldb.com/?ctiid.300711", "name": "VDB-300711 | CTI Indicators (IOB, IOC, IOA)", "tags": ["signature", "permissions-required"]}, {"url": "https://vuldb.com/?submit.521718", "name": "Submit #521718 | Yii Software LLC Yii 2.0 <=2.0.39 Deserialization", "tags": ["third-party-advisory"]}, {"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/Yii2-2.md", "tags": ["exploit"]}]}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-03-24T12:12:44.235025Z", "id": "CVE-2025-2690", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-03-24T12:14:34.960Z"}}]}}