PT-2026-37085 · Redis · Redis-Server

Xint Code

·

Published

2026-05-05

·

Updated

2026-05-05

·

CVE-2026-23479

CVSS v4.0

7.7

High

VectorAV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions redis-server versions 7.2.0 through 8.6.2
Description An issue exists in the unblock client flow where an error return from the processCommandAndResetClient() function is not properly handled when re-executing a blocked command. If a blocked client is evicted during this process, an authenticated attacker can trigger a use-after-free condition, which may lead to remote code execution. Use-after-free is a memory corruption flaw that occurs when an application continues to use a pointer after it has been freed.
Recommendations Update to version 8.6.3.

Fix

Use After Free

Weakness Enumeration

Related Identifiers

CVE-2026-23479

Affected Products

Redis-Server