CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
Lifecycle Timeline
4Description
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
Analysis
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
Technical Context
Remote code execution allows an attacker to run arbitrary commands or code on the target system over a network without prior authentication. This vulnerability is classified as Code Injection (CWE-94).
Affected Products
Affected products: Redis Redis
Remediation
A vendor patch is available — apply it immediately. Apply vendor patches immediately. Restrict network access to vulnerable services. Implement network segmentation and monitoring for anomalous activity.
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| jammy | DNE | - |
| noble | DNE | - |
| upstream | needs-triage | - |
| plucky | ignored | end of life, was needs-triage |
| questing | needs-triage | - |
| Release | Status | Version |
|---|---|---|
| jammy | DNE | - |
| upstream | needs-triage | - |
| noble | released | 7.2.11+dfsg1-0ubuntu0.2 |
| plucky | released | 8.0.6+dfsg1-0ubuntu0.2 |
| questing | released | 8.1.4+dfsg1-0ubuntu0.2 |
| Release | Status | Version |
|---|---|---|
| bionic | needed | - |
| focal | needed | - |
| jammy | needed | - |
| noble | needed | - |
| trusty | needed | - |
| upstream | released | 8.2.2 |
| xenial | needed | - |
| plucky | ignored | end of life, was needed |
| questing | needed | - |
Debian
Bug #1117690| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| forky, sid | fixed | 7.3.6+ds-1 | - |
| (unstable) | fixed | 7.3.6+ds-1 | - |
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | vulnerable | 5:6.0.16-1+deb11u2 | - |
| bullseye (security) | vulnerable | 5:6.0.16-1+deb11u8 | - |
| bookworm, bookworm (security) | fixed | 5:7.0.15-1~deb12u6 | - |
| trixie (security), trixie | fixed | 5:8.0.2-3+deb13u1 | - |
| forky, sid | fixed | 5:8.0.5-1 | - |
| bookworm | fixed | 5:7.0.15-1~deb12u6 | - |
| trixie | fixed | 5:8.0.2-3+deb13u1 | - |
| (unstable) | fixed | 5:8.0.4-1 | - |
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| trixie (security), trixie | fixed | 8.1.1+dfsg1-3+deb13u1 | - |
| forky, sid | fixed | 8.1.4+dfsg1-1 | - |
| trixie | fixed | 8.1.1+dfsg1-3+deb13u1 | - |
| (unstable) | fixed | 8.1.4+dfsg1-1 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-33201