By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Redis Critical Remote Code Execution Vulnerability Discovered After 13 Years
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Redis Critical Remote Code Execution Vulnerability Discovered After 13 Years
News

Redis Critical Remote Code Execution Vulnerability Discovered After 13 Years

News Room
Last updated: 2025/11/08 at 5:34 AM
News Room Published 8 November 2025
Share
Redis Critical Remote Code Execution Vulnerability Discovered After 13 Years
SHARE

Redis recently released a security advisory regarding CVE-2025-49844. This critical (CVSS 10.0) use-after-free (UAF) vulnerability in Lua scripting could allow authenticated attackers to execute remote code on older versions of Redis and Valkey with Lua scripting enabled. Developers are urged to upgrade to patched releases as soon as possible.

Exploiting the so-called “RediShell” remote code execution vulnerability, an authenticated user can use a specially crafted script to manipulate the garbage collector, trigger a use-after-free, and potentially execute arbitrary code remotely.

The vulnerability exploits a 13-year-old UAF memory corruption bug in Redis, allowing a post-auth attacker to send a crafted Lua script to escape the default Lua sandbox and execute arbitrary native code. This grants full host access, enabling data theft, wiping, encryption, resource hijacking, and lateral movement within cloud environments. Riaz Lakhani, CISO at Redis, warns:

Exploitation of this vulnerability requires an attacker to first gain authenticated access to your Redis instance. There are several steps you can take to protect your Redis from being accessed by a malicious actor.

In its security advisory, Redis recommends following security best practices, restricting network access with firewalls and network policies, enforcing strong authentication, and limiting permissions to allow only trusted identities to run Lua scripts or other potentially risky commands.

The exploitation starts with the attacker sending a malicious Lua script that exploits a use-after-free vulnerability, escapes the Lua sandbox, and achieves arbitrary code execution. The attacker can then establish a reverse shell for persistent access and system compromise, for example, exfiltrating sensitive data from Redis, installing malware, or stealing credentials. Furthermore, on a public cloud provider, stolen IAM tokens could be used to access other cloud services, escalate privileges, and move to additional systems. The vulnerability was initially reported by Wiz researchers Benny Isaacs, Nir Brakha, and Sagi Tzadik, who wrote:

Given that Redis is used in an estimated 75% of cloud environments, the potential impact is extensive. Organizations are strongly urged to patch instances immediately by prioritizing those that are exposed to the internet.

While there is no evidence that the vulnerability was ever exploited, Wiz identified 330K Redis instances exposed to the internet, including over 60K without authentication configured, and 57% of cloud environments installing Redis as container images, many without proper security hardening.

Allen Helton, ecosystem engineer at Momento and AWS Hero, and Khawaja Shams, co-founder and CEO of Momento, published an article about securing Redis and Valkey clusters. Shams summarizes on LinkedIn:

CVE-2025-49844 lets attackers escape the Lua sandbox and execute code on the host. That’s bad enough. But the bigger issue? We often see customers with cache clusters inside VPCs still run without authentication. Even after you patch, anyone or anything in your network can connect to your cache and start manipulating data. No exploit required. If you take one action today — put a password on your Valkey nodes. Everything else can wait.

Matthias Endler, Rust consultant, questions whether the language used is the main issue and comments:

13 years. That’s how long it took to find a critical safety vulnerability in one of the most popular C open source codebases, Redis. This is software that was expertly written by some of the best engineers in the world and yet, mistakes can still happen! It’s just that in C a “mistake” can often mean a memory-safety bug that would put user data at risk (…) That’s the nature of memory-safety bugs in C: they can hide in plain sight.

The fix has been backported to all supported releases. According to the Redis documentation, developers should update to 7.22.2-20 or later, 7.8.6-207 or later, 7.4.6-272 or later, 7.2.4-138 or later, or 6.4.2-131 or later. Valkey, a fork of Redis, is also affected and has released the following versions to address it: 7.2.11, 8.0.6, and 8.1.4.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Why Are We All Still Carrying Around Car Keys? Why Are We All Still Carrying Around Car Keys?
Next Article GoWish’s shopping and wish list app is having its biggest year yet |  News GoWish’s shopping and wish list app is having its biggest year yet | News
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Skip monthly fees with this  Microsoft Office purchase
Skip monthly fees with this $40 Microsoft Office purchase
News
xSus$206,000nqunsnxnsfubshnnvny
News
Ring founder Jamie Siminoff on failure, reinvention, and his second act at Amazon
Computing
Use This Free Geological Map To See The Rocks Beneath Your Feet Anywhere In The US – BGR
Use This Free Geological Map To See The Rocks Beneath Your Feet Anywhere In The US – BGR
News

You Might also Like

Skip monthly fees with this  Microsoft Office purchase
News

Skip monthly fees with this $40 Microsoft Office purchase

3 Min Read

xSus$206,000nqunsnxnsfubshnnvny

0 Min Read
Use This Free Geological Map To See The Rocks Beneath Your Feet Anywhere In The US – BGR
News

Use This Free Geological Map To See The Rocks Beneath Your Feet Anywhere In The US – BGR

6 Min Read
Stop chatting, start doing: 5 AI tools that aren’t just another ChatGPT
News

Stop chatting, start doing: 5 AI tools that aren’t just another ChatGPT

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?