VYPR
Critical severityNVD Advisory· Published Sep 21, 2023· Updated Sep 25, 2024

CVE-2015-5467

CVE-2015-5467

Description

web\ViewAction in Yii (aka Yii2) 2.x before 2.0.5 allows attackers to execute any local .php file via a relative path in the view parameeter.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Yii2 before 2.0.5 allows local file inclusion via a relative path in the view parameter of web\ViewAction, enabling arbitrary PHP code execution.

Vulnerability

Overview

CVE-2015-5467 is a local file inclusion (LFI) vulnerability in the Yii2 framework (versions 2.x before 2.0.5). The flaw resides in the web\ViewAction class, which fails to properly sanitize the view parameter. An attacker can supply a relative path (e.g., ../../path/to/file) to include and execute any local .php file on the server [2].

Exploitation

To exploit this vulnerability, an attacker must have access to a Yii2 application that uses the ViewAction action (commonly mapped to routes like site/page). No authentication is required if the action is publicly accessible. By manipulating the view parameter with path traversal sequences, the attacker can force the application to include arbitrary PHP files from the filesystem, such as configuration files, logs, or uploaded payloads [3].

Impact

Successful exploitation allows an attacker to execute arbitrary PHP code with the privileges of the web server. This can lead to full compromise of the application, including data theft, privilege escalation, and lateral movement within the hosting environment. The vulnerability is particularly dangerous because it does not require file upload functionality—any existing .php file on the system can be executed [2][3].

Mitigation

The issue was fixed in Yii2 version 2.0.5. Users are strongly advised to upgrade to this version or later. No workarounds are documented; the only reliable mitigation is to apply the patch. The vulnerability is listed in the FriendsOfPHP security advisories, confirming its severity and the need for immediate action [3][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
yiisoft/yii2Packagist
>= 2.0.0, < 2.0.52.0.5

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.