Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67733: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in valkey-io valkey

0
High
VulnerabilityCVE-2025-67733cvecve-2025-67733cwe-74
Published: Mon Feb 23 2026 (02/23/2026, 19:39:29 UTC)
Source: CVE Database V5
Vendor/Project: valkey-io
Product: valkey

Description

CVE-2025-67733 is a high-severity vulnerability in the valkey distributed key-value database affecting versions prior to 7. 2. 12, 8. 0. 7, 8. 1. 6, and 9. 0. 2. It arises from improper neutralization of special elements in output used by downstream components, specifically in the error handling of Lua scripts that do not correctly handle null characters.

AI-Powered Analysis

AILast updated: 02/23/2026, 20:51:44 UTC

Technical Analysis

CVE-2025-67733 is a vulnerability classified under CWE-74, involving improper neutralization of special elements in output used by downstream components, specifically in the valkey distributed key-value database. The issue exists in the error handling code for Lua scripts, which fails to properly handle null characters. This flaw enables a malicious user to inject arbitrary information into the response stream sent to clients over the same connection. The injection can lead to data corruption or tampering, affecting the integrity and availability of the database responses. The vulnerability affects multiple version ranges of valkey prior to 7.2.12, 8.0.7, 8.1.6, and 9.0.2, where the issue has been fixed. Exploitation requires network access and limited privileges but no user interaction, making it relatively easy to exploit in environments where attackers have some scripting capability. The vulnerability does not directly expose confidential data but can disrupt service and corrupt data returned to clients. The CVSS 3.1 score of 8.5 reflects a high severity with network attack vector, low attack complexity, and partial impact on integrity and high impact on availability. No public exploits have been reported yet, but the potential for damage in multi-tenant or shared connection environments is significant.

Potential Impact

The primary impact of CVE-2025-67733 is on data integrity and availability within valkey database deployments. Attackers can inject arbitrary data into the response stream, potentially causing data corruption or delivering tampered responses to legitimate users sharing the same connection. This can undermine trust in the database's data accuracy and disrupt dependent applications or services. Organizations relying on valkey for critical data storage or distributed caching may experience service degradation or incorrect data processing, leading to operational disruptions. While confidentiality is not directly impacted, the integrity and availability issues can cascade into broader business risks, including compliance violations if data integrity is mandated. Multi-tenant environments or those with shared client connections are particularly vulnerable, as injected data can affect multiple users. The ease of exploitation combined with network accessibility and limited privilege requirements increases the threat level for organizations using affected valkey versions.

Mitigation Recommendations

To mitigate CVE-2025-67733, organizations should immediately upgrade valkey to the fixed versions 7.2.12, 8.0.7, 8.1.6, or 9.0.2 depending on their current deployment version. Beyond patching, administrators should restrict scripting capabilities and limit the use of Lua scripts to trusted users only, reducing the attack surface. Network segmentation and strict access controls should be implemented to limit exposure of valkey instances to untrusted networks or users. Monitoring and logging of unusual scripting commands or response anomalies can help detect attempted exploitation. Additionally, validating and sanitizing all inputs and outputs at the application layer interacting with valkey can provide an extra layer of defense. Organizations should also review connection sharing policies to minimize multi-user connections that could amplify the impact of injection attacks. Finally, conducting regular security assessments and code reviews of custom scripts interacting with valkey can prevent similar injection flaws.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-11T00:45:45.790Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699cbd8cbe58cf853bc4b3d6

Added to database: 2/23/2026, 8:50:20 PM

Last enriched: 2/23/2026, 8:51:44 PM

Last updated: 2/24/2026, 5:33:46 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats