PT-2025-40594 · Redis +2 · Redis +2
Benny Isaacs
+4
·
Published
2025-10-03
·
Updated
2025-10-13
·
CVE-2025-49844
CVSS v3.1
9.9
9.9
Critical
Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Redis versions prior to 8.2.2
Redis versions prior to 8.0.4
Redis versions prior to 7.4.6
Redis versions prior to 7.2.11
Redis versions prior to 6.2.20
Description
Redis, an open-source, in-memory database, contains a critical vulnerability (CVE-2025-49844, also known as RediShell) stemming from a 13-year-old use-after-free memory corruption issue within its Lua scripting engine. This flaw allows an authenticated user to craft a malicious Lua script that manipulates the garbage collector, escapes the Lua sandbox, and ultimately executes arbitrary code on the host system. Approximately 330,000 Redis instances are exposed to the internet, with around 60,000 lacking authentication, significantly increasing the risk. Successful exploitation could lead to full system compromise, including data theft, malware installation, and lateral movement within a network. While authentication is required for exploitation, the large number of unauthenticated instances makes this a widespread threat. A proof-of-concept exploit is publicly available.
Recommendations
Redis versions prior to 8.2.2: Upgrade to version 8.2.2 or later immediately.
Redis versions prior to 8.0.4: Upgrade to version 8.0.4 or later immediately.
Redis versions prior to 7.4.6: Upgrade to version 7.4.6 or later immediately.
Redis versions prior to 7.2.11: Upgrade to version 7.2.11 or later immediately.
Redis versions prior to 6.2.20: Upgrade to version 6.2.20 or later immediately.
Exploit
Fix
RCE
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-12553
CVE-2025-49844
GHSA-4789-QFC9-5F9Q
ZDI-25-933
Affected Products
Debian
Redis
Ubuntu
References · 141
- 🔥 https://github.com/raminfp/redis_exploit⭐ 135 🔗 30 · Exploit
- 🔥 https://github.com/dwisiswant0/CVE-2025-49844⭐ 36 🔗 7 · Exploit
- https://github.com/redis/redis/commit/d5728cb5795c966c5b5b1e0f0ac576a7e69af539⭐ 71077 🔗 24262 · Patch
- https://linux.oracle.com/errata/ELSA-2025-20656.html · Vendor Advisory
- https://linux.oracle.com/errata/ELSA-2025-20655.html · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49844 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-49844 · Security Note
- https://security-tracker.debian.org/tracker/CVE-2025-49844 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-49844 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-49844 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-12553 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-25-933 · Security Note
- https://security-tracker.debian.org/tracker/source-package/redis · Vendor Advisory
- https://linux.oracle.com/errata/ELSA-2025-20654.html · Vendor Advisory
- https://github.com/redis/redis/releases/tag/8.2.2⭐ 71077 🔗 24262 · Note