Lyrie
active-exploitation
ACTIVELY EXPLOITED3 sources verified·4 min read
By Lyrie Threat Intelligence·5/2/2025

What happened

CISA added CVE-2024-58136 (Yii Framework) to the Known Exploited Vulnerabilities catalog, signaling active exploitation in the wild CISA KEV. The entry identifies "improper protection of alternate path" (CWE-424) enabling a remote attacker to execute arbitrary code NVD CVE-2024-58136. CISA set federal remediation due by 2025-05-23 and directs organizations to apply vendor mitigations or discontinue use if none exist CISA KEV.

CISA notes this issue may affect other products embedding Yii, calling out Craft CMS as an example via related tracking (CVE-2025-32432) CISA KEV. The presence in KEV means exploitation has been observed by credible sources, not merely theorized CISA KEV.

Why it matters

Yii is a widely adopted PHP framework; weaknesses at the framework level tend to cascade into the product ecosystem that depends on it NVD CVE-2024-58136. “Improper protection of alternate path” (CWE-424) describes scenarios where an actor bypasses the intended control path—authorization checks, filters, or routing—by using an alternate code path to the same sensitive operation NVD CVE-2024-58136. When such bypass reaches code execution surfaces (plugin hooks, template rendering, or dynamic include points), the outcome is remote code execution (RCE) NVD CVE-2024-58136.

KEV inclusion elevates this from “patch when possible” to “treat as an incident driver.” Attackers are selecting and weaponizing it now, which implies exploitation paths are straightforward and operationally reliable CISA KEV. If your stack includes Yii directly or transitively (e.g., CMS platforms built atop Yii), your exposure surface is larger than a single application boundary CISA KEV.

Technical detail

CVE-2024-58136 maps to CWE-424: “Improper Protection of Alternate Path,” where controls guard a primary entry but overlook an alternate route that reaches the same sensitive function NVD CVE-2024-58136. In web frameworks, that often manifests as:

  • Unchecked route aliases or fallback controllers that bypass middleware checks NVD CVE-2024-58136.
  • Path canonicalization gaps where encoded or Unicode-normalized paths skip filters tied to the normalized form NVD CVE-2024-58136.
  • Alternate execution channels (e.g., CLI-like endpoints, importers, or preview/render paths) not covered by the main authz gate NVD CVE-2024-58136.

CISA’s write-up explicitly calls out the risk of arbitrary code execution from this bypass CISA KEV. That linkage implies the alternate path ultimately hits a code-evaluable surface (e.g., templating, dynamic includes, gadgetized deserialization, or plugin execution) that an attacker can drive post-bypass CISA KEV. The CVE record confirms the CWE class and ties it to Yii specifically, supporting the framework-level nature of the flaw MITRE CVE.

Transitive risk is real. CISA flags that other products embedding Yii can inherit exposure, citing Craft CMS as a representative downstream (tracked separately as CVE-2025-32432) CISA KEV. Organizations should assume multiple applications may share the same vulnerable dependency even if business owners view them as unrelated systems CISA KEV.

Defense

Immediate actions:

  • Patch/mitigate per vendor guidance and KEV directive; prioritize internet-exposed assets and those processing untrusted input CISA KEV.
  • Inventory for Yii usage (direct and transitive). Correlate SBOMs and dependency manifests across web apps and CMS deployments MITRE CVE.

Compensating controls while patching:

  • Enforce strict path normalization at the edge: collapse multiple slashes, decode percent-encodings, and normalize Unicode before policy checks to reduce alternate-path variance NVD CVE-2024-58136.
  • WAF/Reverse proxy policies to block suspicious alternate path probes: encoded slashes (%2F), dot segments, mixed separators, or unexpected route aliases until fixes are in place NVD CVE-2024-58136.
  • Lock down secondary channels (preview/render endpoints, file importers, background task triggers) behind authz equal to primary flows NVD CVE-2024-58136.

Detection and hunting focus:

  • Look for bursts of 4xx/302 around odd-looking URIs that later transition to 200 on a variant path (a hallmark of alternate-path discovery) CISA KEV.
  • Flag path variants within ±60s windows sharing the same base but with different encodings or Unicode forms that hit sensitive handlers NVD CVE-2024-58136.
  • Correlate successful hits that bypass expected middleware logs or miss standard auth/CSRF markers, indicating a route skipped the normal control chain MITRE CVE.

Governance:

  • For federal environments, follow BOD 22-01-aligned KEV remediation timelines and document exceptions only with compensating controls justified by risk CISA KEV.

Lyrie Verdict

This is a classic framework-level bypass with active exploitation—and it rewards automation. An attacker (or autonomous agent) can iterate through encoding variants, route aliases, and fallback handlers at machine speed until a sensitive handler answers, then pivot to RCE surfaces CISA KEV. Lyrie’s position: treat alternate-path exploitation as a graph search over normalized and non-normalized request spaces. Autonomous defense must do the same—normalize, enumerate, and score path variants in-line.

Operationally, Lyrie instruments edge telemetry to build per-app route graphs and run-time diffs; we detect when a request path reaches a protected handler without traversing the expected middleware chain—a CWE-424 signature—and auto-block in milliseconds NVD CVE-2024-58136. We also correlate bursts of failed probes followed by a success on a minimally mutated path, which is the exploitation tell for this class CISA KEV. For downstreams inheriting Yii, the same autonomous heuristics apply across apps, not just a single service boundary MITRE CVE.

Lyrie Verdict

Framework-level CWE-424 bypass is being exploited now (KEV). Lyrie auto-normalizes and graphs request paths, detects skipped middleware routes in-line, and blocks alternate-path RCE attempts at machine speed across all Yii-dependent services.