CVE-2025-49844

CRITICAL EXPLOITED RANSOMWARE NUCLEI

Redis < 6.2.20 - Use After Free

Title source: rule

Description

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

Exploits (19)

github WORKING POC 326 stars
by raminfp · pythondos
https://github.com/raminfp/redis_exploit
github WORKING POC 64 stars
by Yuri08loveElaina · pythonpoc
https://github.com/Yuri08loveElaina/CVE-2025-49844
nomisec WORKING POC 23 stars
by saneki · remote
https://github.com/saneki/cve-2025-49844
github WORKING POC 13 stars
by lastvocher · pythonpoc
https://github.com/lastvocher/redis-CVE-2025-49844
github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2025/CVE-2025-49844
github WORKING POC 6 stars
by pedrorichil · pythonpoc
https://github.com/pedrorichil/CVE-2025-49844
nomisec STUB 2 stars
by ksnnd32 · poc
https://github.com/ksnnd32/redis_exploit
github SCANNER 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-49844
github WORKING POC 2 stars
by MiclelsonCN · pythonpoc
https://github.com/MiclelsonCN/CVE-2025-49844_POC
github SCANNER 1 stars
by angelusrivera · gopoc
https://github.com/angelusrivera/CVE-2025-49844
github SCANNER 1 stars
by srozb · pythonpoc
https://github.com/srozb/reditrap
github SCANNER 1 stars
by Mufti22 · pythondos
https://github.com/Mufti22/CVE-2025-49844-RediShell-Vulnerability-Scanner
github SCANNER 1 stars
by imbas007 · pythonpoc
https://github.com/imbas007/CVE-2025-49844-Vulnerability-Scanner
nomisec WORKING POC
by 0xAshwesker · poc
https://github.com/0xAshwesker/CVE-2025-49844
github SCANNER
by gopinaath · shellpoc
https://github.com/gopinaath/CVE-2025-49844-discovery
gitlab WORKING POC
by patricnilackshan · poc
https://gitlab.com/patricnilackshan/redis_exploit
nomisec WORKING POC
by Network-Sec · poc
https://github.com/Network-Sec/CVE-2025-49844-RediShell-AI-made-Revshell
nomisec WORKING POC
by Zain3311 · poc
https://github.com/Zain3311/CVE-2025-49844
vulncheck_xdb WORKING POC
dos
https://github.com/elyasbassir/CVE-2025-49844

Nuclei Templates (1)

Redis Lua Parser < 8.2.2 - Use After Free
CRITICALVERIFIEDby pussycat0x
Shodan: product:"redis"

Scores

CVSS v3 9.9
EPSS 0.1243
EPSS Percentile 93.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2025-12-23
Ransomware Use Confirmed

Classification

CWE
CWE-416
Status published

Affected Products (2)

redis/redis < 6.2.20
lfprojects/valkey < 7.2.11

Timeline

Published Oct 03, 2025
Tracked Since Feb 18, 2026