CVE-2025-62507
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-04

Last updated on: 2025-12-08

Assigner: GitHub, Inc.

Description
Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-04
Last Modified
2025-12-08
Generated
2026-05-07
AI Q&A
2025-11-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
redis redis From 8.2.0 (inc) to 8.2.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Redis versions 8.2.0 and above allows a user to run the XACKDEL command with multiple IDs, triggering a stack buffer overflow. This overflow may potentially lead to remote code execution, meaning an attacker could execute arbitrary code on the affected system. The issue is fixed in version 8.2.3, and as a workaround, users can be prevented from executing the XACKDEL command using Access Control Lists (ACL).


How can this vulnerability impact me? :

The vulnerability can lead to remote code execution on the Redis server, which means an attacker could gain control over the system running Redis. This could result in unauthorized access, data theft, data corruption, or disruption of services relying on Redis.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately without patching, restrict the execution of the XACKDEL command using Redis Access Control Lists (ACL). This prevents users from running the vulnerable command. Additionally, upgrading Redis to version 8.2.3 or later will fix the issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart