CVE-2025-32023

HIGH LAB

Redis < 6.2.19 - Remote Code Execution

Title source: rule

Description

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

Exploits (5)

exploitdb WORKING POC
by Beatriz Fresno Naumova · pythonremotelinux
https://www.exploit-db.com/exploits/52477
nomisec WORKING POC 208 stars
by leesh3288 · poc
https://github.com/leesh3288/CVE-2025-32023
github WORKING POC
by manus-use · postscriptpoc
https://github.com/manus-use/cve-pocs/tree/main/redis-CVE-2025-32023
nomisec WRITEUP
by LordBheem · poc
https://github.com/LordBheem/CVE-2025-32023
nomisec WORKING POC
by 44528zja · poc
https://github.com/44528zja/Blackash-CVE-2025-32023

Scores

CVSS v3 7.0
EPSS 0.1262
EPSS Percentile 94.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull redis:7.4.2-alpine3.21@sha256:02419de7eddf55aa5bcf49efb74e88fa8d931b4d77c07eff8a6b2144472b6952
+1 more repos

Details

CWE
CWE-680
Status published
Products (1)
redis/redis 2.8.0 - 6.2.19
Published Jul 07, 2025
Tracked Since Feb 18, 2026