CVE-2025-67733

NameCVE-2025-67733
DescriptionValkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
redict (PTS)forky, sid7.3.6+ds-1vulnerable
redis (PTS)bullseye5:6.0.16-1+deb11u2vulnerable
bullseye (security)5:6.0.16-1+deb11u8vulnerable
bookworm, bookworm (security)5:7.0.15-1~deb12u6vulnerable
trixie (security), trixie5:8.0.2-3+deb13u1vulnerable
forky, sid5:8.0.5-1vulnerable
valkey (PTS)trixie (security), trixie8.1.1+dfsg1-3+deb13u1vulnerable
forky, sid8.1.4+dfsg1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
redictsource(unstable)(unfixed)
redissource(unstable)(unfixed)
valkeysource(unstable)(unfixed)

Notes

https://github.com/valkey-io/valkey/security/advisories/GHSA-p876-p7q5-hv2m
Fixed by: https://github.com/valkey-io/valkey/commit/3d7598e8c7db4857a0e76582861dec14b555c343 (8.1.6)

Search for package or bug name: Reporting problems