<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Yiisoft — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/yiisoft/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 19:35:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/yiisoft/feed.xml" rel="self" type="application/rss+xml"/><item><title>Yii 2 Local File Inclusion via View Parameter Name Collision (CVE-2026-39850)</title><link>https://feed.craftedsignal.io/briefs/2026-05-yii2-lfi/</link><pubDate>Mon, 11 May 2026 19:35:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-yii2-lfi/</guid><description>A local file inclusion vulnerability (CVE-2026-39850) exists in Yii 2 versions prior to 2.0.55 due to the `View::renderPhpFile()` method's handling of the `_file_` parameter, allowing attackers to read arbitrary files and potentially achieve remote code execution if they can write PHP files.</description><content:encoded><![CDATA[<p>Yii 2, a PHP framework, is vulnerable to a local file inclusion (LFI) vulnerability (CVE-2026-39850) affecting versions prior to 2.0.55. The vulnerability lies within the <code>View::renderPhpFile()</code> method, where the code calls <code>extract($_params_, EXTR_OVERWRITE)</code> before including the view file. This allows an attacker to control the <code>_file_</code> parameter within the <code>$params</code> array and overwrite the internal local variable that dictates which file is included. This vulnerability can be exploited to read arbitrary files on the server. If an attacker possesses the capability to write PHP files to the server through a separate vulnerability or misconfiguration, they could potentially leverage this LFI to achieve remote code execution (RCE). This vulnerability impacts systems using the vulnerable versions of the Yii 2 framework and highlights the risks associated with uncontrolled variable extraction.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Yii 2 application running a version prior to 2.0.55.</li>
<li>The attacker discovers a page or functionality that uses the <code>View::renderPhpFile()</code> method to render a view.</li>
<li>The attacker crafts a request to this page, including a <code>_file_</code> parameter within the <code>$params</code> array.</li>
<li>The <code>extract($_params_, EXTR_OVERWRITE)</code> function within <code>View::renderPhpFile()</code> is called.</li>
<li>The attacker-controlled <code>_file_</code> parameter overwrites the internal <code>$file</code> variable, which should point to the intended view file.</li>
<li>The <code>require</code> statement then includes the file specified by the attacker-controlled <code>_file_</code> parameter.</li>
<li>If the attacker specifies a path to an existing file, the contents of that file are exposed.</li>
<li>If the attacker can also write PHP code to the server (via another vulnerability or misconfiguration), the attacker can specify the path to that file, resulting in arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to read arbitrary files on the server. This can lead to information disclosure, including sensitive configuration files, source code, or user data. Furthermore, if an attacker can upload or create PHP files on the server, they can leverage this LFI vulnerability to achieve remote code execution, potentially leading to full system compromise. The number of potential victims depends on the number of applications using vulnerable versions of Yii 2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Yii 2 version 2.0.55 or later to patch CVE-2026-39850.</li>
<li>Deploy the Sigma rule &ldquo;Detect Yii2 LFI via file parameter overwrite&rdquo; to your SIEM to detect exploitation attempts.</li>
<li>Review application code that uses <code>View::renderPhpFile()</code> and ensure that user-supplied input is not directly used to construct the <code>$params</code> array, specifically the <code>_file_</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>lfi</category><category>file-inclusion</category><category>php</category><category>cloud</category></item></channel></rss>