VYPR
Critical severityNVD Advisory· Published Apr 4, 2023· Updated Feb 13, 2025

CVE-2023-26750

CVE-2023-26750

Description

SQL injection vulnerability found in Yii Framework Yii 2 Framework before v.2.0.47 allows the a remote attacker to execute arbitrary code via the runAction function. NOTE: the software maintainer's position is that the vulnerability is in third-party code, not in the framework.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Yii2 Framework <=2.0.47 has an SQL injection in runAction() via unsanitized parameters; arbitrary code execution is possible.

Root

Cause

CVE-2023-26750 describes an SQL injection vulnerability in Yii Framework 2 prior to version 2.0.47. The flaw resides in the yiibaseController::runAction($route,$params) function, where parameters received are not properly sanitized before being passed to database queries [2][3]. This unsanitized handling allows an attacker to inject malicious SQL statements through controller action parameters.

Exploitation

An attacker can exploit this vulnerability by crafting HTTP requests that supply specially prepared parameter values to any action handled by the framework. The proof-of-concept demonstrates triggering the injection by calling yii\baseModule::runAction('PARAM0', ['VAR0' => 'INJECTION', 'VAR2' => 'PARAM2']) [2][3][4]. No authentication is required, and the attack is network-based, making it accessible to remote unauthenticated attackers.

Impact

Successful exploitation enables a remote attacker to execute arbitrary SQL statements on the underlying database. Depending on the database configuration and permissions, this could lead to data exfiltration, modification, deletion, or even full compromise of the database server. The description notes the potential for arbitrary code execution, likely through database features like xp_cmdshell or user-defined functions [1].

Mitigation

Yii Framework maintainers released version 2.0.47, which fixes the input sanitization issue. Users are strongly advised to upgrade to this version or later. The maintainer has noted that the vulnerability may originate from third-party code, but the framework itself should still be updated [1][2]. No workarounds have been published, and the CVE is not currently listed in CISA's Known Exploited Vulnerabilities catalog.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
yiisoft/yii2Packagist
< 2.0.472.0.47

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.