Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 07 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands. | |
Title | Redis allows out of bounds writes in hyperloglog commands leading to RCE | |
Weaknesses | CWE-680 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-07T15:22:19.155Z
Updated: 2025-07-07T15:43:15.696Z
Reserved: 2025-04-01T21:57:32.955Z
Link: CVE-2025-32023

Updated: 2025-07-07T15:43:06.981Z

Status : Received
Published: 2025-07-07T16:15:22.830
Modified: 2025-07-07T16:15:22.830
Link: CVE-2025-32023

No data.