EUVD-2025-33200

| CVE-2025-46819 MEDIUM
2025-10-03 [email protected]
6.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High

Lifecycle Timeline

4
EUVD ID Assigned
Mar 13, 2026 - 19:29 euvd
EUVD-2025-33200
Analysis Generated
Mar 13, 2026 - 19:29 vuln.today
Patch Released
Jan 27, 2026 - 19:37 nvd
Patch available
CVE Published
Oct 03, 2025 - 19:15 nvd
MEDIUM 6.3

Description

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

Analysis

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.

Technical Context

An integer overflow occurs when an arithmetic operation produces a value that exceeds the maximum (or minimum) size of the integer type used to store it. This vulnerability is classified as Integer Overflow or Wraparound (CWE-190).

Affected Products

Affected products: Redis Redis

Remediation

A vendor patch is available — apply it immediately. Use safe integer arithmetic libraries. Check for overflow conditions before operations. Use appropriately sized integer types.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +5.0
CVSS: +32
POC: 0

Vendor Status

Ubuntu

Priority: Medium
redict
Release Status Version
jammy DNE -
noble DNE -
upstream needs-triage -
plucky ignored end of life, was needs-triage
questing needs-triage -
valkey
Release Status Version
jammy DNE -
upstream needs-triage -
noble released 7.2.11+dfsg1-0ubuntu0.2
plucky released 8.0.6+dfsg1-0ubuntu0.2
questing released 8.1.4+dfsg1-0ubuntu0.2
redis
Release Status Version
bionic needed -
focal needed -
jammy needed -
noble needed -
trusty needed -
upstream released 8.2.2
xenial needed -
plucky ignored end of life, was needed
questing needed -

Debian

Bug #1117690
redict
Release Status Fixed Version Urgency
forky, sid fixed 7.3.6+ds-1 -
(unstable) fixed 7.3.6+ds-1 -
redis
Release Status Fixed Version Urgency
bullseye fixed 5:6.0.16-1+deb11u8 -
bullseye (security) fixed 5:6.0.16-1+deb11u8 -
bookworm, bookworm (security) fixed 5:7.0.15-1~deb12u6 -
trixie (security), trixie fixed 5:8.0.2-3+deb13u1 -
forky, sid fixed 5:8.0.5-1 -
bookworm fixed 5:7.0.15-1~deb12u6 -
trixie fixed 5:8.0.2-3+deb13u1 -
(unstable) fixed 5:8.0.4-1 -
valkey
Release Status Fixed Version Urgency
trixie (security), trixie fixed 8.1.1+dfsg1-3+deb13u1 -
forky, sid fixed 8.1.4+dfsg1-1 -
trixie fixed 8.1.1+dfsg1-3+deb13u1 -
(unstable) fixed 8.1.4+dfsg1-1 -

Share

EUVD-2025-33200 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy