Direct Vulnerabilities

Known vulnerabilities in the etcd package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Improper Validation of Unsafe Equivalence in Input

*
  • H
Improper Validation of Unsafe Equivalence in Input

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Out-of-bounds Read

*
  • M
Authorization Bypass Through User-Controlled Key

*
  • M
Authorization Bypass Through User-Controlled Key

*
  • M
Missing Authentication for Critical Function

*
  • M
Missing Authentication for Critical Function

*
  • H
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • H
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • H
Improper Certificate Validation

*
  • H
Improper Certificate Validation

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • M
CVE-2025-68121

*
  • M
CVE-2025-68121

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • M
CVE-2025-4673

*
  • M
Misinterpretation of Input

*
  • M
Misinterpretation of Input

*
  • M
Misinterpretation of Input

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Access Control

*
  • M
Resource Exhaustion

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Uncontrolled Recursion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • M
Use of Uninitialized Variable

*
  • M
Use of Uninitialized Variable

*
  • M
Improper Input Validation

*
  • H
Improper Authentication

*
  • H
Memory Leak

*
  • H
Memory Leak

*
  • M
Unchecked Return Value

*
  • M
Unchecked Return Value

*
  • L
Race Condition

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Incorrect Privilege Assignment

*
  • M
Incorrect Privilege Assignment

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Improper Access Control

*
  • M
Improper Authentication

*
  • M
Authentication Bypass by Primary Weakness

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Improper Authentication

*
  • L
Improper Authentication

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Improper Authorization

*
  • L
Improper Authorization

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Incorrect Calculation

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*