Description
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.
Exploits (5)
exploitdb
WORKING POC
by Beatriz Fresno Naumova · pythonremotelinux
https://www.exploit-db.com/exploits/52477
github
WORKING POC
by manus-use · postscriptpoc
https://github.com/manus-use/cve-pocs/tree/main/redis-CVE-2025-32023
References (7)
Scores
CVSS v3
7.0
EPSS
0.1262
EPSS Percentile
94.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
+1 more repos
Details
CWE
CWE-680
Status
published
Products (1)
redis/redis
2.8.0 - 6.2.19
Published
Jul 07, 2025
Tracked Since
Feb 18, 2026