CVE Vulnerabilities

CVE-2025-67733

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Feb 23, 2026 | Modified: Feb 25, 2026
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
8.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

NameVendorStart VersionEnd Version
ValkeyLfprojects*7.2.12 (excluding)
ValkeyLfprojects8.0.0 (including)8.0.7 (excluding)
ValkeyLfprojects8.1.0 (including)8.1.6 (excluding)
ValkeyLfprojects9.0.0 (including)9.0.2 (excluding)
Red Hat Enterprise Linux 10RedHatvalkey-0:8.0.7-1.el10_1*

Potential Mitigations

References