EUVD-2025-33178

| CVE-2025-49844 CRITICAL
2025-10-03 [email protected]
9.9
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
PoC Detected
Mar 20, 2026 - 14:16 vuln.today
Public exploit code
Patch Released
Mar 20, 2026 - 14:16 nvd
Patch available
EUVD ID Assigned
Mar 13, 2026 - 19:29 euvd
EUVD-2025-33178
Analysis Generated
Mar 13, 2026 - 19:29 vuln.today
CVE Published
Oct 03, 2025 - 20:15 nvd
CRITICAL 9.9

Description

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

Analysis

UAF in Redis 8.2.1 via crafted Lua scripts by authenticated users. EPSS 12.4%. Patch available.

Technical Context

CWE-416 in Redis Lua scripting engine.

Affected Products

['Redis <= 8.2.1']

Remediation

Update Redis.

Priority Score

72
Low Medium High Critical
KEV: 0
EPSS: +12.4
CVSS: +50
POC: +20

Vendor Status

Ubuntu

Priority: High
redict
Release Status Version
jammy DNE -
noble DNE -
upstream needs-triage -
plucky released 7.3.2+ds-1ubuntu0.1
questing released 7.3.5+ds-1ubuntu0.1
redis
Release Status Version
bionic released 5:4.0.9-1ubuntu0.2+esm6
focal released 5:5.0.7-2ubuntu0.1+esm4
jammy released 5:6.0.16-1ubuntu1.1
upstream released 8.2.2
noble released 5:7.0.15-1ubuntu0.24.04.2
plucky released 5:7.0.15-3ubuntu0.1
questing released 5:8.0.2-3ubuntu0.25.10.1
trusty released 2:2.8.4-2ubuntu0.2+esm5
xenial released 2:3.0.6-1ubuntu0.4+esm4
valkey
Release Status Version
jammy DNE -
upstream needs-triage -
noble released 7.2.11+dfsg1-0ubuntu0.2
questing released 8.1.4+dfsg1-0ubuntu0.2
plucky released 8.0.6+dfsg1-0ubuntu0.2

Debian

Bug #1117690
redict
Release Status Fixed Version Urgency
forky, sid fixed 7.3.6+ds-1 -
(unstable) fixed 7.3.6+ds-1 -
redis
Release Status Fixed Version Urgency
bullseye fixed 5:6.0.16-1+deb11u8 -
bullseye (security) fixed 5:6.0.16-1+deb11u8 -
bookworm, bookworm (security) fixed 5:7.0.15-1~deb12u6 -
trixie (security), trixie fixed 5:8.0.2-3+deb13u1 -
forky, sid fixed 5:8.0.5-1 -
bookworm fixed 5:7.0.15-1~deb12u6 -
trixie fixed 5:8.0.2-3+deb13u1 -
(unstable) fixed 5:8.0.4-1 -
valkey
Release Status Fixed Version Urgency
trixie (security), trixie fixed 8.1.1+dfsg1-3+deb13u1 -
forky, sid fixed 8.1.4+dfsg1-1 -
trixie fixed 8.1.1+dfsg1-3+deb13u1 -
(unstable) fixed 8.1.4+dfsg1-1 -

Share

EUVD-2025-33178 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy