CVE-2025-62507
BaseFortify
Publication date: 2025-11-04
Last updated on: 2025-12-08
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| redis | redis | From 8.2.0 (inc) to 8.2.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Redis versions 8.2.0 and above allows a user to run the XACKDEL command with multiple IDs, triggering a stack buffer overflow. This overflow may potentially lead to remote code execution, meaning an attacker could execute arbitrary code on the affected system. The issue is fixed in version 8.2.3, and as a workaround, users can be prevented from executing the XACKDEL command using Access Control Lists (ACL).
How can this vulnerability impact me? :
The vulnerability can lead to remote code execution on the Redis server, which means an attacker could gain control over the system running Redis. This could result in unauthorized access, data theft, data corruption, or disruption of services relying on Redis.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability immediately without patching, restrict the execution of the XACKDEL command using Redis Access Control Lists (ACL). This prevents users from running the vulnerable command. Additionally, upgrading Redis to version 8.2.3 or later will fix the issue.