Tech »  Topic »  13-Year-Old Redis RCE Flaw Lets Attackers Seize Complete Host Control

13-Year-Old Redis RCE Flaw Lets Attackers Seize Complete Host Control


A remote code execution vulnerability discovered in Redis, the widely-used in-memory data structure store, has sent shockwaves through the cybersecurity community.

The flaw, designated CVE-2025-49844 and dubbed “RediShell” by researchers, carries the maximum CVSS 3.1 severity score of 10.0 and affects all Redis versions worldwide.

13-Year-Old Bug Creates Modern Security Crisis

Wiz Research uncovered this devastating vulnerability that exploits a Use-After-Free memory corruption bug embedded in Redis source code for approximately 13 years.

The flaw allows authenticated attackers to send specially crafted malicious Lua scripts that escape the Lua sandbox environment and achieve arbitrary native code execution on the Redis host system.

CVE ID Product Vulnerability Type Impact Attack Vector Authentication Required
CVE-2025-49844 Redis (all versions) Use-After-Free (UAF) Memory Corruption Remote Code Execution (RCE) Network Yes (Post-auth)

The vulnerability’s impact extends far beyond simple data breach scenarios.

Successful exploitation grants attackers complete control over the host system ...


Copyright of this story solely belongs to gbhackers . To see the full text click HERE