PT-2025-40594 · Redis +3 · Redis +3
Benny Isaacs
+4
·
Published
2025-10-03
·
Updated
2025-10-15
·
CVE-2025-49844
CVSS v3.1
9.9
9.9
Critical
Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Redis versions prior to 8.2.2
Redis versions prior to 8.0.4
Redis versions prior to 7.4.6
Redis versions prior to 7.2.11
Redis versions prior to 6.2.20
LF Projects' Valkey versions affected by CVE-2025-49844
Description
Redis is an open-source, in-memory database that persists on disk. A critical vulnerability (CVE-2025-49844), dubbed RediShell, exists due to a use-after-free memory corruption bug in the Lua scripting engine. This flaw allows an authenticated attacker to craft a malicious Lua script, escape the Lua sandbox, and execute arbitrary code on the host system. Approximately 330,000 Redis instances are exposed to the internet, with around 60,000 lacking authentication, increasing the risk of exploitation. The vulnerability has existed for 13 years and carries a CVSS score of 10.0. Successful exploitation can lead to full system takeover, data theft, and the deployment of malware. A proof-of-concept exploit is publicly available.
Recommendations
Upgrade Redis to version 8.2.2 or later.
Upgrade Redis to version 8.0.4 or later.
Upgrade Redis to version 7.4.6 or later.
Upgrade Redis to version 7.2.11 or later.
Upgrade Redis to version 6.2.20 or later.
If upgrading is not immediately possible, restrict the use of the EVAL and EVALSHA commands via Access Control Lists (ACLs).
Disable Lua scripting if it is not required.
Ensure Redis instances have strong authentication enabled.
Restrict network access to Redis instances to trusted hosts.
Run Redis with a non-privileged user account.
Exploit
Fix
RCE
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
ALT-PU-2025-12931
BDU:2025-12553
CVE-2025-49844
GHSA-4789-QFC9-5F9Q
ZDI-25-933
Affected Products
Alt Linux
Debian
Redis
Ubuntu
References · 154
- 🔥 https://github.com/raminfp/redis_exploit⭐ 135 🔗 30 · Exploit
- 🔥 https://github.com/dwisiswant0/CVE-2025-49844⭐ 36 🔗 7 · Exploit
- https://github.com/redis/redis/commit/d5728cb5795c966c5b5b1e0f0ac576a7e69af539⭐ 71077 🔗 24262 · Patch
- https://bdu.fstec.ru/vul/2025-12553 · Security Note
- https://osv.dev/vulnerability/CVE-2025-49844 · Vendor Advisory
- https://zerodayinitiative.com/advisories/ZDI-25-933 · Security Note
- https://bdu.fstec.ru/vul/2025-12557 · Security Note
- https://security-tracker.debian.org/tracker/CVE-2025-49844 · Vendor Advisory
- https://linux.oracle.com/errata/ELSA-2025-20656.html · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46818 · Security Note
- https://linux.oracle.com/errata/ELSA-2025-20655.html · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46819 · Security Note
- https://bdu.fstec.ru/vul/2025-12820 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49844 · Security Note
- https://errata.altlinux.org/ALT-PU-2025-12931 · Vendor Advisory