Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rgrr-p7gp-5xj7 | Netty Redis Codec Encoder has a CRLF Injection Issue |
Thu, 14 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Io.netty
Io.netty netty-codec-redis Netty Netty netty |
|
| Vendors & Products |
Io.netty
Io.netty netty-codec-redis Netty Netty netty |
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, the Netty Redis codec encoder (RedisEncoder) writes user-controlled string content directly to the network output buffer without validating or sanitizing CRLF (\r\n) characters. Since the Redis Serialization Protocol (RESP) uses CRLF as the command/response delimiter, an attacker who can control the content of a Redis message can inject arbitrary Redis commands or forge fake responses. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final. | |
| Title | Netty: CRLF Injection in Netty Redis Codec Encoder | |
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T18:17:23.328Z
Reserved: 2026-04-28T17:26:12.086Z
Link: CVE-2026-42586
Updated: 2026-05-14T18:17:13.327Z
Status : Undergoing Analysis
Published: 2026-05-13T19:17:24.323
Modified: 2026-05-14T19:16:36.110
Link: CVE-2026-42586
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:34:00Z
Github GHSA