CVE-2025-32023

Published Jul 7, 2025

Last updated a day ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-32023 is a vulnerability affecting Redis, an open-source, in-memory database. It stems from a stack/heap out-of-bounds write within hyperloglog operations. An authenticated user can exploit this vulnerability by using a specially crafted string, potentially leading to remote code execution. The vulnerability affects Redis versions from 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19. The issue is addressed in versions 8.0.3, 7.4.5, 7.2.10, and 6.2.19. As a workaround, users can restrict the execution of hyperloglog operations using ACL to mitigate the risk without patching.

Description
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.
Source
security-advisories@github.com
NVD status
Received

Risk scores

CVSS 3.1

Type
Secondary
Base score
7
Impact score
5.9
Exploitability score
1
Vector string
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

security-advisories@github.com
CWE-680

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

21