Home

Description

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.

PUBLISHED Reserved 2025-04-30 | Published 2025-10-03 | Updated 2025-10-03 | Assigner GitHub_M




HIGH: 7.0CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-190: Integer Overflow or Wraparound

Product status

< 8.2.2
affected

References

github.com/.../redis/security/advisories/GHSA-m8fj-85cg-7vhp

github.com/...ommit/fc9abc775e308374f667fdf3e723ef4b7eb0e3ca

github.com/redis/redis/releases/tag/8.2.2

cve.org (CVE-2025-46817)

nvd.nist.gov (CVE-2025-46817)

Download JSON