Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely

0
Critical
Vulnerabilityremote
Published: Tue Oct 07 2025 (10/07/2025, 08:33:00 UTC)
Source: The Hacker News

Description

A critical 13-year-old vulnerability (CVE-2025-49844) in Redis allows authenticated users to execute arbitrary code remotely by exploiting a use-after-free bug in the Lua scripting engine. This flaw enables attackers to escape the Lua sandbox and gain full control over the Redis host system, potentially leading to data theft, malware deployment, and lateral movement within cloud environments. The vulnerability affects all Redis versions and requires authentication, but many Redis instances are exposed online with weak or no authentication, increasing risk. Patches have been released in October 2025, and temporary mitigations include restricting Lua script execution via ACLs. No evidence of exploitation in the wild exists yet, but the widespread deployment and default insecure configurations make this a severe threat. European organizations using Redis, especially those with exposed or poorly secured instances, face significant risks. Immediate patching and strict access controls are essential to prevent exploitation.

AI-Powered Analysis

AILast updated: 10/07/2025, 11:50:36 UTC

Technical Analysis

Redis, a widely used in-memory database, has disclosed a critical security vulnerability identified as CVE-2025-49844, also known as RediShell, with a CVSS score of 10.0. This vulnerability is a use-after-free (UAF) memory corruption bug in the Lua scripting engine embedded in Redis, present for approximately 13 years across all versions. The flaw allows an authenticated attacker to craft a malicious Lua script that manipulates the garbage collector to trigger the UAF condition, escaping the Lua sandbox and executing arbitrary native code on the Redis host. This leads to full system compromise, enabling attackers to exfiltrate data, deploy malware, hijack resources, or move laterally within cloud environments. Exploitation requires prior authentication, but many Redis instances are exposed on the internet, with around 60,000 lacking any authentication, making them vulnerable to unauthorized access. Redis has released patches in versions 6.2.20, 7.2.11, 7.4.6, 8.0.4, and 8.2.2 to address this issue. Until patches can be applied, administrators are advised to restrict Lua script execution by disabling EVAL and EVALSHA commands via access control lists (ACLs) and ensuring only trusted users can execute scripts. The vulnerability poses a significant threat due to Redis's widespread use, default insecure configurations, and the critical nature of the flaw. Although no active exploitation has been reported, the potential for cryptojacking, data breaches, and botnet enlistment is high, necessitating immediate remediation.

Potential Impact

For European organizations, this vulnerability presents a severe risk to confidentiality, integrity, and availability of critical data and systems. Redis is commonly used in cloud and on-premises environments for caching, session management, and real-time data processing, making it a high-value target. Successful exploitation could lead to unauthorized data access, data loss, ransomware deployment, or disruption of services. The ability to execute arbitrary code on the host system could allow attackers to pivot to other internal systems or cloud services, amplifying the impact. Organizations with Redis instances exposed to the internet or with weak authentication controls are particularly vulnerable. The threat is exacerbated in sectors with sensitive data such as finance, healthcare, and government services prevalent in Europe. Additionally, the potential for cryptojacking or botnet recruitment could degrade system performance and increase operational costs. The widespread deployment of Redis and the long-standing nature of the flaw mean many organizations may be unknowingly exposed, increasing the urgency for patching and mitigation.

Mitigation Recommendations

1. Immediately apply the official Redis patches released on October 3, 2025 (versions 6.2.20, 7.2.11, 7.4.6, 8.0.4, and 8.2.2) to all Redis instances. 2. Restrict Lua script execution by disabling EVAL and EVALSHA commands using Redis Access Control Lists (ACLs) to prevent unauthorized script execution. 3. Ensure all Redis instances are not exposed directly to the internet; use network segmentation, firewalls, and VPNs to limit access to trusted users and systems only. 4. Enforce strong authentication mechanisms on all Redis instances, eliminating any instances without authentication. 5. Regularly audit Redis configurations and access logs to detect unauthorized access attempts or suspicious Lua script executions. 6. Implement monitoring and alerting for unusual Redis activity, including unexpected command usage or network connections. 7. Educate DevOps and security teams about the risks of Lua scripting in Redis and the importance of secure configuration. 8. For cloud environments, leverage cloud provider security features such as private endpoints and security groups to restrict Redis access. 9. Consider disabling Lua scripting entirely if not required by the application to reduce the attack surface. 10. Conduct penetration testing and vulnerability assessments post-mitigation to validate the effectiveness of controls.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/10/13-year-redis-flaw-exposed-cvss-100.html","fetched":true,"fetchedAt":"2025-10-07T11:50:18.294Z","wordCount":1058}

Threat ID: 68e4fe7ca677756fc98a4e0c

Added to database: 10/7/2025, 11:50:20 AM

Last enriched: 10/7/2025, 11:50:36 AM

Last updated: 10/7/2025, 3:07:31 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats