CVE-2025-66566: CWE-201: Insertion of Sensitive Information Into Sent Data in yawkat lz4-java
CVE-2025-66566 is a high-severity vulnerability in yawkat lz4-java versions prior to 1. 10. 1, where insufficient clearing of the output buffer in Java-based decompressor implementations allows remote attackers to read residual data from previous decompression operations. This can lead to disclosure of sensitive information if the output buffer is reused without proper clearing. The vulnerability does not affect JNI-based implementations and requires no authentication or user interaction to exploit. Although no known exploits are currently reported in the wild, the vulnerability poses a significant confidentiality risk. The issue is fixed in version 1. 10. 1 of lz4-java. European organizations using vulnerable versions in their Java applications, especially those handling sensitive data, should prioritize upgrading to mitigate potential data leakage.
AI Analysis
Technical Summary
CVE-2025-66566 is a vulnerability classified under CWE-201 (Insertion of Sensitive Information Into Sent Data) affecting yawkat lz4-java, a Java library providing LZ4 compression and decompression functionality. The root cause lies in insufficient clearing of the output buffer in Java-based decompressor implementations in versions 1.10.0 and earlier. When decompressing crafted compressed input, the output buffer may retain residual data from previous decompression operations if the buffer is reused without being cleared. This residual data can include sensitive information previously processed by the application, leading to unintended data disclosure. The vulnerability can be exploited remotely without authentication or user interaction, as an attacker only needs to supply malicious compressed input to trigger the leakage. JNI-based implementations of lz4-java are not affected, indicating the flaw is specific to the pure Java decompression code path. The vulnerability has a CVSS 4.0 base score of 8.2, reflecting its high severity due to network attack vector, low complexity, no privileges required, and high impact on confidentiality. No known exploits have been reported in the wild as of the publication date. The issue is resolved in lz4-java version 1.10.1, where proper clearing of the output buffer is implemented to prevent residual data leakage.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized disclosure of sensitive data processed by applications using vulnerable versions of lz4-java. This can include personal data, credentials, or proprietary information, depending on the application's context. Data leakage can lead to regulatory non-compliance under GDPR, reputational damage, and potential financial losses. Since the vulnerability can be exploited remotely without authentication, any exposed service accepting compressed input using the vulnerable library is at risk. The impact is particularly critical for sectors such as finance, healthcare, and government, where sensitive data confidentiality is paramount. Additionally, organizations relying on Java-based microservices or middleware that incorporate lz4-java for compression may inadvertently expose internal data. The lack of user interaction or privileges required for exploitation increases the threat surface. However, the absence of known exploits in the wild suggests that immediate widespread attacks may not be occurring, but proactive mitigation is essential to prevent future exploitation.
Mitigation Recommendations
European organizations should immediately assess their software inventory to identify usage of yawkat lz4-java versions prior to 1.10.1. The primary mitigation is to upgrade all instances of lz4-java to version 1.10.1 or later, where the vulnerability is fixed. For applications where upgrading is not immediately feasible, implement compensating controls such as ensuring output buffers are explicitly cleared before reuse in custom decompression logic. Conduct code reviews to verify that decompression buffers do not retain sensitive data. Network-level protections such as input validation and filtering of compressed data from untrusted sources can reduce exposure. Employ runtime application self-protection (RASP) or intrusion detection systems to monitor for anomalous decompression requests. Additionally, review logging and monitoring to detect unusual decompression activity. Finally, update incident response plans to include scenarios involving data leakage via compression libraries.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-66566: CWE-201: Insertion of Sensitive Information Into Sent Data in yawkat lz4-java
Description
CVE-2025-66566 is a high-severity vulnerability in yawkat lz4-java versions prior to 1. 10. 1, where insufficient clearing of the output buffer in Java-based decompressor implementations allows remote attackers to read residual data from previous decompression operations. This can lead to disclosure of sensitive information if the output buffer is reused without proper clearing. The vulnerability does not affect JNI-based implementations and requires no authentication or user interaction to exploit. Although no known exploits are currently reported in the wild, the vulnerability poses a significant confidentiality risk. The issue is fixed in version 1. 10. 1 of lz4-java. European organizations using vulnerable versions in their Java applications, especially those handling sensitive data, should prioritize upgrading to mitigate potential data leakage.
AI-Powered Analysis
Technical Analysis
CVE-2025-66566 is a vulnerability classified under CWE-201 (Insertion of Sensitive Information Into Sent Data) affecting yawkat lz4-java, a Java library providing LZ4 compression and decompression functionality. The root cause lies in insufficient clearing of the output buffer in Java-based decompressor implementations in versions 1.10.0 and earlier. When decompressing crafted compressed input, the output buffer may retain residual data from previous decompression operations if the buffer is reused without being cleared. This residual data can include sensitive information previously processed by the application, leading to unintended data disclosure. The vulnerability can be exploited remotely without authentication or user interaction, as an attacker only needs to supply malicious compressed input to trigger the leakage. JNI-based implementations of lz4-java are not affected, indicating the flaw is specific to the pure Java decompression code path. The vulnerability has a CVSS 4.0 base score of 8.2, reflecting its high severity due to network attack vector, low complexity, no privileges required, and high impact on confidentiality. No known exploits have been reported in the wild as of the publication date. The issue is resolved in lz4-java version 1.10.1, where proper clearing of the output buffer is implemented to prevent residual data leakage.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized disclosure of sensitive data processed by applications using vulnerable versions of lz4-java. This can include personal data, credentials, or proprietary information, depending on the application's context. Data leakage can lead to regulatory non-compliance under GDPR, reputational damage, and potential financial losses. Since the vulnerability can be exploited remotely without authentication, any exposed service accepting compressed input using the vulnerable library is at risk. The impact is particularly critical for sectors such as finance, healthcare, and government, where sensitive data confidentiality is paramount. Additionally, organizations relying on Java-based microservices or middleware that incorporate lz4-java for compression may inadvertently expose internal data. The lack of user interaction or privileges required for exploitation increases the threat surface. However, the absence of known exploits in the wild suggests that immediate widespread attacks may not be occurring, but proactive mitigation is essential to prevent future exploitation.
Mitigation Recommendations
European organizations should immediately assess their software inventory to identify usage of yawkat lz4-java versions prior to 1.10.1. The primary mitigation is to upgrade all instances of lz4-java to version 1.10.1 or later, where the vulnerability is fixed. For applications where upgrading is not immediately feasible, implement compensating controls such as ensuring output buffers are explicitly cleared before reuse in custom decompression logic. Conduct code reviews to verify that decompression buffers do not retain sensitive data. Network-level protections such as input validation and filtering of compressed data from untrusted sources can reduce exposure. Employ runtime application self-protection (RASP) or intrusion detection systems to monitor for anomalous decompression requests. Additionally, review logging and monitoring to detect unusual decompression activity. Finally, update incident response plans to include scenarios involving data leakage via compression libraries.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-04T16:17:35.385Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69332135f88dbe026c014958
Added to database: 12/5/2025, 6:15:17 PM
Last enriched: 12/12/2025, 7:16:00 PM
Last updated: 2/7/2026, 9:18:28 AM
Views: 381
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.