Out-of-Bound Data Access in Redis In-Memory Database
CVE-2025-46819
Key Information:
Badges
What is CVE-2025-46819?
Redis, an open-source in-memory database, is affected by a vulnerability where an authenticated user can leverage specially crafted Lua scripts to read out-of-bound data, potentially resulting in server crashes and subsequent denial of service. This vulnerability affects all versions of Redis that support Lua scripting. The issue is patched in version 8.2.2. Users can mitigate this risk by preventing unauthorized execution of Lua scripts through Access Control Lists (ACLs), effectively restricting both the EVAL and FUNCTION command families.
Affected Version(s)
redis < 8.2.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
7% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
