Tracked as CVE-2025-49844, this issue affects all versions of Redis that support Lua scripting functionality, posing a significant risk to organizations relying on Redis for in-memory data storage.
Security researchers from Wiz, including Benny Isaacs, Nir Brakha, and Sagi Tzadik, collaborating with Trend Micro’s Zero Day Initiative, identified this severe vulnerability that exploits Redis’s garbage collection mechanism.
The flaw arises from improper memory management in the Lua scripting implementation, where references to freed memory persist after the garbage collector reclaims the underlying structures.
By crafting malicious Lua scripts that manipulate garbage collection timings, attackers can trigger a use-after-free condition, gaining control over freed memory regions to execute arbitrary code with the privileges of the Redis server process.
The vulnerability’s impact is heightened by its simplicity of exploitation: attackers need only valid Redis credentials to trigger the flaw remotely over standard network connections.
Exploitation does not require additional user interaction or elevated privileges on the target system, and the attack complexity is rated as low.
Furthermore, the changed scope rating indicates the potential for compromised Redis processes to affect other resources within the same security boundary.
Redis servers often expose the EVAL and EVALSHA commands to enable advanced scripting capabilities.
This vulnerability directly targets those commands, giving attackers a powerful foothold. With a CVSS 3.1 score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), CVE-2025-49844 is classified as Critical and demands immediate attention from administrators.
Should exploitation become widespread, organizations could face unauthorized data manipulation, theft of sensitive information, lateral movement within the network, and full system compromise.
| Field | Value |
|---|---|
| CVE ID | CVE-2025-49844 |
| Vulnerability Type | Use-After-Free (CWE-416) |
| Impact | Remote Code Execution |
| CVSS 3.1 Score | 10.0 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) |
| Severity | Critical |
As of now, an official patch remains in development (marked as “TBD”). In the interim, Redis administrators can implement immediate protective measures to mitigate risk.
The primary workaround involves leveraging Access Control Lists (ACLs) to restrict or disable the EVAL and EVALSHA commands, effectively preventing the execution of Lua scripts:
Organizations should also audit network exposure of Redis servers, ensuring only trusted hosts can connect.
Deploying Redis behind firewalls, VPNs, or within secure internal networks will further reduce the likelihood of unauthorized access.
Longer-term remediation should include applying official patches once released and validating all Redis clusters through security testing.
Maintaining strict credential hygiene and rotating access keys regularly will minimize the chance of compromised credentials being used.
By promptly applying ACL restrictions and monitoring for indicators of compromise, organizations can defend against exploitation of this critical use-after-free vulnerability and maintain the integrity of their Redis deployments.
Find this Story Interesting! Follow us on Google News, LinkedIn and X to Get More Instant Updates
The post Redis Use-After-Free Vulnerability Enables Remote Code Execution appeared first on Cyber Security News.
50 Years Ago An early morning trash fire that may have been set by four…
Editor’s note: This is the second of two parts. “In happy moments one realizes that…
An overnight frost on April 20 set asparagus season off to a false start in…
BOSTON — Amid widespread fear across the country over federal immigration law enforcement activities, legislation…
NORTHAMPTON — City Council at its last meeting voted unanimously to approve a revised resolution…
The post Dua Lipa Sues Samsung For $15M Over Use Of Her Image On TV…
This website uses cookies.