Description
RediSearch is a Redis module that provides querying, secondary indexing, and full-text search for Redis. An authenticated redis user executing FT.SEARCH or FT.AGGREGATE with a specially crafted LIMIT command argument, or FT.SEARCH with a specially crafted KNN command argument, can trigger an integer overflow, leading to heap overflow and potential remote code execution. This vulnerability is fixed in 2.6.24, 2.8.21, and 2.10.10. Avoid setting value of -1 or large values for configuration parameters MAXSEARCHRESULTS and MAXAGGREGATERESULTS, to avoid exploiting large LIMIT arguments.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/RediSearch/RediSearch/security/advisories/GHSA-p2pg-67m3-4c76
Scores
CVSS v3
7.0
EPSS
0.0151
EPSS Percentile
81.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-122
CWE-190
Status
published
Products (3)
RediSearch/RediSearch
>= 2.0.0, < 2.6.24
RediSearch/RediSearch
>= 2.10.0, < 2.10.10
RediSearch/RediSearch
>= 2.8.0, < 2.8.21
Published
Jan 08, 2025
Tracked Since
Feb 18, 2026