Out of Bounds Write Vulnerability in Redis Open Source In-Memory Database
CVE-2025-32023

7HIGH

Key Information:

Vendor

Redis

Status
Vendor
CVE Published:
7 July 2025

Badges

📈 Score: 740👾 Exploit Exists🟡 Public PoC

What is CVE-2025-32023?

CVE-2025-32023 identifies a serious out-of-bounds write vulnerability in the Redis open-source in-memory database, which is widely used for facilitating real-time data storage and retrieval across various applications. This vulnerability spans versions from 2.8 to just before 8.0.3, specifically impacting 7.4.5, 7.2.10, and 6.2.19. The flaw allows an authenticated user to exploit a specially crafted string during hyperloglog operations, triggering a stack or heap out-of-bounds write that can potentially lead to remote code execution. Such exploitation could permit attackers to execute arbitrary code on affected systems, posing serious risks to the integrity and security of information stored within the database.

To protect against this vulnerability, Redis has released fixes in version 8.0.3 and other patched versions. An alternative mitigation strategy involves using access control lists (ACLs) to restrict user access to hyperloglog commands, thereby preventing the execution of operations that could exploit this vulnerability.

Potential impact of CVE-2025-32023

  1. Remote Code Execution Risk: The vulnerability enables attackers to execute arbitrary code, which can compromise entire systems, facilitating unauthorized access to sensitive data and critical infrastructure.

  2. Data Integrity Threats: With the ability to manipulate database operations, an attacker could alter, delete, or inject malicious data into the database, impacting data quality and leading to further exploitation.

  3. Service Disruption: Exploiting this vulnerability could lead to service downtime as affected Redis instances may become unstable or crash, disrupting applications that rely on immediate data retrieval and storage capabilities.

Affected Version(s)

redis >= 8.0.0, < 8.0.3 < 8.0.0, 8.0.3

redis >= 7.4-rc1, < 7.4.5 < 7.4-rc1, 7.4.5

redis >= 7.0.0, < 7.2.10 < 7.0.0, 7.2.10

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-32023 : Out of Bounds Write Vulnerability in Redis Open Source In-Memory Database