DragonflyDB Dragonfly through 1.28.2 (fixed in 1.29.0) allows authenticated users to cause a denial of service (daemon crash) via a Lua library command that references a large negative integer.
References
| Link | Resource |
|---|---|
| https://gist.github.com/ankki-zsyang/d8215cf6e868d07546eaa5346a884ebd | Exploit Third Party Advisory |
| https://github.com/dragonflydb/dragonfly/commit/4612aec9a78e3f604e6fb19bee51acde89723308 | Patch |
| https://github.com/dragonflydb/dragonfly/issues/4468 | Exploit Issue Tracking Patch |
| https://github.com/dragonflydb/dragonfly/issues/4468 | Exploit Issue Tracking Patch |
Configurations
History
No history.
Information
Published : 2025-04-17 18:15
Updated : 2025-07-11 16:36
NVD link : CVE-2025-26269
Mitre link : CVE-2025-26269
CVE.ORG link : CVE-2025-26269
JSON object : View
Products Affected
dragonflydb
- dragonfly
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
