Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
History

Tue, 04 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
Description Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
Title Redis: Bug in XACKDEL may lead to stack overflow and potential RCE
Weaknesses CWE-121
CWE-20
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-04T21:24:44.802Z

Updated: 2025-11-04T21:36:20.912Z

Reserved: 2025-10-15T15:03:28.133Z

Link: CVE-2025-62507

cve-icon Vulnrichment

Updated: 2025-11-04T21:36:06.105Z

cve-icon NVD

Status : Received

Published: 2025-11-04T22:16:38.330

Modified: 2025-11-04T22:16:38.330

Link: CVE-2025-62507

cve-icon Redhat

No data.