CRLF Injection Affecting elasticsearch-9.0-oci-entrypoint package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-ELASTICSEARCH90OCIENTRYPOINT-14726803
  • published31 Dec 2025
  • disclosed16 Dec 2025

Introduced: 16 Dec 2025

CVE-2025-67735  (opens in a new tab)
CWE-93  (opens in a new tab)

How to fix?

There is no fixed version for Minimos:latest elasticsearch-9.0-oci-entrypoint.

NVD Description

Note: Versions mentioned in the description apply only to the upstream elasticsearch-9.0-oci-entrypoint package and not the elasticsearch-9.0-oci-entrypoint package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the io.netty.handler.codec.http.HttpRequestEncoder has a CRLF injection with the request URI when constructing a request. This leads to request smuggling when HttpRequestEncoder is used without proper sanitization of the URI. Any application / framework using HttpRequestEncoder can be subject to be abused to perform request smuggling using CRLF injection. Versions 4.1.129.Final and 4.2.8.Final fix the issue.

CVSS Base Scores

version 3.1