CVE-2025-67733: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in valkey-io valkey
CVE-2025-67733 is a high-severity vulnerability in the valkey distributed key-value database affecting versions prior to 7. 2. 12, 8. 0. 7, 8. 1. 6, and 9. 0. 2. It arises from improper neutralization of special elements in output used by downstream components, specifically in the error handling of Lua scripts that do not correctly handle null characters.
AI Analysis
Technical Summary
CVE-2025-67733 is a vulnerability classified under CWE-74, involving improper neutralization of special elements in output used by downstream components, specifically in the valkey distributed key-value database. The issue exists in the error handling code for Lua scripts, which fails to properly handle null characters. This flaw enables a malicious user to inject arbitrary information into the response stream sent to clients over the same connection. The injection can lead to data corruption or tampering, affecting the integrity and availability of the database responses. The vulnerability affects multiple version ranges of valkey prior to 7.2.12, 8.0.7, 8.1.6, and 9.0.2, where the issue has been fixed. Exploitation requires network access and limited privileges but no user interaction, making it relatively easy to exploit in environments where attackers have some scripting capability. The vulnerability does not directly expose confidential data but can disrupt service and corrupt data returned to clients. The CVSS 3.1 score of 8.5 reflects a high severity with network attack vector, low attack complexity, and partial impact on integrity and high impact on availability. No public exploits have been reported yet, but the potential for damage in multi-tenant or shared connection environments is significant.
Potential Impact
The primary impact of CVE-2025-67733 is on data integrity and availability within valkey database deployments. Attackers can inject arbitrary data into the response stream, potentially causing data corruption or delivering tampered responses to legitimate users sharing the same connection. This can undermine trust in the database's data accuracy and disrupt dependent applications or services. Organizations relying on valkey for critical data storage or distributed caching may experience service degradation or incorrect data processing, leading to operational disruptions. While confidentiality is not directly impacted, the integrity and availability issues can cascade into broader business risks, including compliance violations if data integrity is mandated. Multi-tenant environments or those with shared client connections are particularly vulnerable, as injected data can affect multiple users. The ease of exploitation combined with network accessibility and limited privilege requirements increases the threat level for organizations using affected valkey versions.
Mitigation Recommendations
To mitigate CVE-2025-67733, organizations should immediately upgrade valkey to the fixed versions 7.2.12, 8.0.7, 8.1.6, or 9.0.2 depending on their current deployment version. Beyond patching, administrators should restrict scripting capabilities and limit the use of Lua scripts to trusted users only, reducing the attack surface. Network segmentation and strict access controls should be implemented to limit exposure of valkey instances to untrusted networks or users. Monitoring and logging of unusual scripting commands or response anomalies can help detect attempted exploitation. Additionally, validating and sanitizing all inputs and outputs at the application layer interacting with valkey can provide an extra layer of defense. Organizations should also review connection sharing policies to minimize multi-user connections that could amplify the impact of injection attacks. Finally, conducting regular security assessments and code reviews of custom scripts interacting with valkey can prevent similar injection flaws.
Affected Countries
United States, Germany, United Kingdom, Japan, South Korea, France, Canada, Australia, Netherlands, India
CVE-2025-67733: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in valkey-io valkey
Description
CVE-2025-67733 is a high-severity vulnerability in the valkey distributed key-value database affecting versions prior to 7. 2. 12, 8. 0. 7, 8. 1. 6, and 9. 0. 2. It arises from improper neutralization of special elements in output used by downstream components, specifically in the error handling of Lua scripts that do not correctly handle null characters.
AI-Powered Analysis
Technical Analysis
CVE-2025-67733 is a vulnerability classified under CWE-74, involving improper neutralization of special elements in output used by downstream components, specifically in the valkey distributed key-value database. The issue exists in the error handling code for Lua scripts, which fails to properly handle null characters. This flaw enables a malicious user to inject arbitrary information into the response stream sent to clients over the same connection. The injection can lead to data corruption or tampering, affecting the integrity and availability of the database responses. The vulnerability affects multiple version ranges of valkey prior to 7.2.12, 8.0.7, 8.1.6, and 9.0.2, where the issue has been fixed. Exploitation requires network access and limited privileges but no user interaction, making it relatively easy to exploit in environments where attackers have some scripting capability. The vulnerability does not directly expose confidential data but can disrupt service and corrupt data returned to clients. The CVSS 3.1 score of 8.5 reflects a high severity with network attack vector, low attack complexity, and partial impact on integrity and high impact on availability. No public exploits have been reported yet, but the potential for damage in multi-tenant or shared connection environments is significant.
Potential Impact
The primary impact of CVE-2025-67733 is on data integrity and availability within valkey database deployments. Attackers can inject arbitrary data into the response stream, potentially causing data corruption or delivering tampered responses to legitimate users sharing the same connection. This can undermine trust in the database's data accuracy and disrupt dependent applications or services. Organizations relying on valkey for critical data storage or distributed caching may experience service degradation or incorrect data processing, leading to operational disruptions. While confidentiality is not directly impacted, the integrity and availability issues can cascade into broader business risks, including compliance violations if data integrity is mandated. Multi-tenant environments or those with shared client connections are particularly vulnerable, as injected data can affect multiple users. The ease of exploitation combined with network accessibility and limited privilege requirements increases the threat level for organizations using affected valkey versions.
Mitigation Recommendations
To mitigate CVE-2025-67733, organizations should immediately upgrade valkey to the fixed versions 7.2.12, 8.0.7, 8.1.6, or 9.0.2 depending on their current deployment version. Beyond patching, administrators should restrict scripting capabilities and limit the use of Lua scripts to trusted users only, reducing the attack surface. Network segmentation and strict access controls should be implemented to limit exposure of valkey instances to untrusted networks or users. Monitoring and logging of unusual scripting commands or response anomalies can help detect attempted exploitation. Additionally, validating and sanitizing all inputs and outputs at the application layer interacting with valkey can provide an extra layer of defense. Organizations should also review connection sharing policies to minimize multi-user connections that could amplify the impact of injection attacks. Finally, conducting regular security assessments and code reviews of custom scripts interacting with valkey can prevent similar injection flaws.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-11T00:45:45.790Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699cbd8cbe58cf853bc4b3d6
Added to database: 2/23/2026, 8:50:20 PM
Last enriched: 2/23/2026, 8:51:44 PM
Last updated: 2/24/2026, 5:33:46 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3070: Cross Site Scripting in SourceCodester Modern Image Gallery App
MediumCVE-2026-3069: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3068: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3067: Path Traversal in HummerRisk
MediumCVE-2026-3066: Command Injection in HummerRisk
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.