CVE-2025-49844
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-03

Last updated on: 2026-03-20

Assigner: GitHub, Inc.

Description
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-03
Last Modified
2026-03-20
Generated
2026-05-07
AI Q&A
2025-10-03
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 8 associated CPEs
Vendor Product Version / Range
redis redis From 7.0.0 (inc) to 7.2.9 (inc)
redis redis From 7.0.0 (inc) to 7.2.9 (inc)
lfprojects valkey to 7.2.11 (exc)
lfprojects valkey From 8.0.0 (inc) to 8.0.6 (exc)
lfprojects valkey From 8.1.0 (inc) to 8.1.4 (exc)
redis redis From 7.0.0 (inc) to 7.2.9 (inc)
redis redis From 7.0.0 (inc) to 7.2.9 (inc)
redis redis From 7.0.0 (inc) to 7.2.9 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-416 The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Redis versions 8.2.1 and below allows an authenticated user to exploit a specially crafted Lua script to manipulate the garbage collector, causing a use-after-free condition that can potentially lead to remote code execution. It affects all Redis versions with Lua scripting enabled and is fixed in version 8.2.2.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker with authentication to execute arbitrary code remotely on the Redis server, potentially leading to full system compromise, data loss, or unauthorized access.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, you should prevent users from executing Lua scripts by using Access Control Lists (ACL) to restrict the EVAL and EVALSHA commands. Alternatively, upgrade Redis to version 8.2.2 or later where the issue is fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart