CVE-2025-67733
February 23, 2026
Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.
Affected Packages
https://github.com/valkey-io/valkey.git (GITHUB):
Affected version(s) >=9.0.0 <9.0.2Fix Suggestion:
Update to version 9.0.2https://github.com/valkey-io/valkey.git (GITHUB):
Affected version(s) =7.2.4 <9.1.0-rc1Fix Suggestion:
Update to version 9.1.0-rc1https://github.com/valkey-io/valkey.git (GITHUB):
Affected version(s) >=8.1.0 <8.1.6Fix Suggestion:
Update to version 8.1.6https://github.com/valkey-io/valkey.git (GITHUB):
Affected version(s) >=8.0.0 <8.0.7Fix Suggestion:
Update to version 8.0.7https://github.com/valkey-io/valkey.git (GITHUB):
Affected version(s) >=7.2.4 <7.2.12Fix Suggestion:
Update to version 7.2.12Related Resources (1)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.4
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
LOW
Subsequent System Availability
HIGH
CVSS v3
Base Score:
8.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
NONE
Integrity
LOW
Availability
HIGH
Weakness Type (CWE)
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
EPSS
Base Score:
0.02