Valkey-Io Valkey vulnerabilities

3 known vulnerabilities affecting valkey-io/valkey.

Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3

Vulnerabilities

Page 1 of 1
CVE-2025-67733HIGHCVSS 7.1fixed in 7.2.12v>= 8.0.0, < 8.0.7+2 more2026-02-23
CVE-2025-67733 [HIGH] CWE-74 CVE-2025-67733: Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a mal Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does no
nvd
CVE-2026-21863HIGHCVSS 7.5fixed in 7.2.12v>= 8.0.0, < 8.0.7+2 more2026-02-23
CVE-2026-21863 [HIGH] CWE-125 CVE-2026-21863: Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a mal Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extensio
nvd
CVE-2026-27623HIGHCVSS 7.5v>= 9.0.0, < 9.0.32026-02-23
CVE-2026-27623 [HIGH] CWE-20 CVE-2026-27623: Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valkey system does not properly reset the networking state after processing an empty request. A malicious actor
nvd