Critical CVSS 10.0 Vulnerability Allows Remote Code Execution by Attackers

Published:

spot_img

October 7, 2025Ravie LakshmananVulnerability / Cloud Security

Critical Redis Security Vulnerability Uncovered

Recent developments in cloud security have brought to light a serious vulnerability in Redis, an in-memory database that many organizations rely on. Labeled as CVE-2025-49844, or colloquially known as RediShell, this flaw has earned a maximum CVSS score of 10.0, signaling its potential for significant impact if exploited.

Understanding the Vulnerability

The crux of this issue lies in the ability of an authenticated user to execute specially crafted Lua scripts. According to alerts published on GitHub, this could lead to a use-after-free condition, which in turn may facilitate remote code execution. Essentially, this allows an attacker who has gained legitimate access to manipulate the garbage collector within Redis.

It’s worth noting that successful exploitation requires an initial authenticated connection to a Redis instance. This detail emphasizes the importance of robust security measures—namely, securing these databases from unauthorized internet exposure and employing strong authentication protocols.

Which Versions Are Affected?

All versions of Redis that support Lua scripting are susceptible to the vulnerability identified. However, a patch was provided in newer releases, specifically versions 6.2.20, 7.2.11, 7.4.6, 8.0.4, and 8.2.2, which were all released on October 3, 2025. Users are strongly encouraged to update their Redis instances to these versions to mitigate risk.

Preventive Measures and Workarounds

In light of this vulnerability, administrators are advised to take immediate preventive steps until they can apply the latest updates. One recommended approach is to restrict execution of Lua scripts by modifying the access control list (ACL) settings to block EVAL and EVALSHA commands. Organizations should also ensure that only verified users can run Lua scripts or any commands that may pose security risks.

The Discovery of RediShell

Cloud security firm Wiz discovered this vulnerability and reported it to Redis on May 16, 2025. They described it as a use-after-free memory corruption bug that had remained in the Redis codebase for nearly 13 years. The implications of this flaw are considerable, as it allows an attacker to send an infected Lua script to Redis, effectively gaining control not just over the database but also over the server hosting it.

In a potential exploit scenario, the attacker could access sensitive information, deploy malware, or move laterally across cloud environments to compromise additional systems. Wiz elaborated on this alarming capability, stating that it allows attackers to bypass the Lua sandbox, achieving arbitrary code execution directly on Redis hosts.

Current Risk Landscape

Despite no confirmed instances of this vulnerability being exploited in real-world scenarios, the sheer number of accessible Redis instances makes them attractive targets for malicious actors. Currently, there are approximately 330,000 Redis instances exposed online—of which around 60,000 lack any form of authentication. This situation underscores the urgency for organizations to prioritize security measures.

Wiz has highlighted that the combination of many exposed Redis instances, default insecure configurations, and the critical nature of this vulnerability makes it a significant threat across various sectors. The call to action is clear: organizations must take immediate steps to safeguard their data and infrastructure.

spot_img

Related articles

Recent articles

Dubai Airshow 2025: The Biggest Yet, Showcasing eVTOL Innovations, a Mega Space Pavilion, and 1,500 Exhibitors

Dubai Airshow 2025: The Biggest Innovation Showcase Yet Overview of Dubai Airshow 2025 The Dubai Airshow 2025 is gearing up to take place at Dubai World...

Mohali Court Denies Bail to Main Suspect in ₹72-Lakh Cyber Fraud Case

Mohali Court Denies Bail in ₹72-Lakh Cyber Fraud Case A Mohali court has declined a regular bail request from Arun, a 23-year-old man involved in...

Railways Shuts Down 7.7 Million Accounts in Major Tatkal Bot Fraud Crackdown

Indian Railways: Strengthening Digital Security for Ticket Bookings In a significant move to combat ticket fraud, Indian Railways has rolled out a new security regimen...

Discover Six Flags Qiddiya: Opening Date, Ticket Prices, and 28 Record-Breaking Rides

Discovering Qiddiya City: A New Era of Entertainment An Overview of Qiddiya City Nestled in the stunning Tuwaiq Mountains and just a 40-minute drive from Riyadh,...