Vulnerability Description
`yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. This has been patched in 1.1.27.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yiiframework | Yii | < 1.1.27 |
Related Weaknesses (CWE)
References
- https://github.com/yiisoft/yii/commit/ed67b7cc57216557c5c595c6650cdd2d3aa41c52PatchThird Party Advisory
- https://github.com/yiisoft/yii/security/advisories/GHSA-442f-wcwq-fpcfThird Party Advisory
- https://github.com/yiisoft/yii/commit/ed67b7cc57216557c5c595c6650cdd2d3aa41c52PatchThird Party Advisory
- https://github.com/yiisoft/yii/security/advisories/GHSA-442f-wcwq-fpcfThird Party Advisory
FAQ
What is CVE-2022-41922?
CVE-2022-41922 is a vulnerability with a CVSS score of 8.1 (HIGH). `yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. This has been patched in 1.1.27.
How severe is CVE-2022-41922?
CVE-2022-41922 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-41922?
Check the references section above for vendor advisories and patch information. Affected products include: Yiiframework Yii.