Home

Description

Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.

PUBLISHED Reserved 2025-10-15 | Published 2025-11-04 | Updated 2025-11-06 | Assigner GitHub_M




HIGH: 7.7CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-20: Improper Input Validation

CWE-121: Stack-based Buffer Overflow

Product status

>= 8.2.0, < 8.2.3
affected

References

github.com/.../redis/security/advisories/GHSA-jhjx-x4cf-4vm8

github.com/...ommit/5f83972188f6e5b1d6f1940218c650a9cbdf7741

github.com/redis/redis/releases/tag/8.2.3

cve.org (CVE-2025-62507)

nvd.nist.gov (CVE-2025-62507)

Download JSON