CVE-2025-32023

7.0 HIGH
Published: July 07, 2025 Modified: February 04, 2026
View on NVD

Description

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/redis/redis/releases/tag/6.2.19
Source: security-advisories@github.com
Release Notes
https://github.com/redis/redis/releases/tag/7.2.10
Source: security-advisories@github.com
Release Notes
https://github.com/redis/redis/releases/tag/7.4.5
Source: security-advisories@github.com
Release Notes
https://github.com/redis/redis/releases/tag/8.0.3
Source: security-advisories@github.com
Release Notes
https://github.com/redis/redis/security/advisories/GHSA-rp2m-q4j6-gr43
Source: security-advisories@github.com
Third Party Advisory
https://www.exploit-db.com/exploits/52477
Source: af854a3a-2127-422b-91ae-364da2661108

7 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.0 / 10.0
EPSS (Exploit Probability)
12.6%
94th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

redis