Tech »  Topic »  Redis Server Use-After-Free Vulnerability Allows Remote Code Execution

Redis Server Use-After-Free Vulnerability Allows Remote Code Execution


A critical security vulnerability has been discovered in Redis Server that could allow authenticated attackers to achieve remote code execution through a use-after-free flaw in the Lua scripting engine.

The vulnerability, tracked as CVE-2025-49844, affects all versions of Redis that support Lua scripting functionality.

Critical Memory Corruption Flaw Discovered

Security researchers from Wiz, including Benny Isaacs, Nir Brakha, and Sagi Tzadik working with Trend Micro’s Zero Day Initiative, identified this severe vulnerability that exploits Redis’s garbage collection mechanism.

The flaw allows authenticated users to craft malicious Lua scripts that manipulate the garbage collector, triggering a use-after-free condition that can lead to arbitrary code execution on the target system.

Field Value
CVE ID CVE-2025-49844
Vulnerability Type Use-After-Free (CWE-416)
Impact Remote Code Execution
CVSS 3.1 Score 10.0 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)
Severity Critical ...

Copyright of this story solely belongs to gbhackers . To see the full text click HERE