Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
References
| Link | Resource |
|---|---|
| https://github.com/redis/redis/commit/5f83972188f6e5b1d6f1940218c650a9cbdf7741 | Patch |
| https://github.com/redis/redis/releases/tag/8.2.3 | Release Notes |
| https://github.com/redis/redis/security/advisories/GHSA-jhjx-x4cf-4vm8 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-11-04 22:16
Updated : 2025-12-08 16:23
NVD link : CVE-2025-62507
Mitre link : CVE-2025-62507
CVE.ORG link : CVE-2025-62507
JSON object : View
Products Affected
redis
- redis
