- Description
- Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- redis
CVSS 4.0
- Type
- Secondary
- Base score
- 7.7
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- HIGH
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
Due to detailed exploit guidance in the wild, the priority of patching this #Redis XACKDEL #vulnerability increased this week. CVE-2025-62507. Redis's XACKDEL command, used to acknowledge and delete messages from a queue in a single operation, was implemented in a way that could
@CheckmarxZero
27 Jan 2026
93 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Redis の脆弱性 CVE-2025-62507:RCE エクスプロイトの可能性を JFrog が実証 https://t.co/PXPiBGmdTj データベースとして広く使われている Redis に、深刻なリモートコード実行 (RCE) の経路が見つかりました。この脆弱性 CVE
@iototsecnews
26 Jan 2026
188 Impressions
3 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-62507 : CRITICAL VULNERABILITY ALERT 🚨 Redis An unauthenticated stack-based buffer overflow vulnerability has been disclosed in Redis, a widely deployed in-memory data store used as a cache, message broker, session store, and database in modern cloud-native
@OstorlabSec
21 Jan 2026
61 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Public exploit disclosed for Redis CVE-2025-62507. Missing stack canaries in Docker allow unauthenticated RCE. Update to v8.3.2 immediately. #Redis #CVE202562507 #ExploitReleased #CyberSecurity #RCE #Docker #InfoSec #PatchNow https://t.co/eJrUzCPxFV
@the_yellow_fall
21 Jan 2026
499 Impressions
3 Retweets
11 Likes
6 Bookmarks
0 Replies
0 Quotes
csirt_it: ‼ #Redis: disponibile un #PoC per lo sfruttamento della CVE-2025-62507 Rischio: 🟠 Tipologia: 🔸 Remote Code Execution 🔗 https://t.co/r9zV9kUQqW ⚠ Importante mantenere aggiornati i sistemi https://t.co/zX9qZ6NRrX
@Vulcanux_
19 Jan 2026
58 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
‼ #Redis: disponibile un #PoC per lo sfruttamento della CVE-2025-62507 Rischio: 🟠 Tipologia: 🔸 Remote Code Execution 🔗 https://t.co/NAt10yTYtQ ⚠ Importante mantenere aggiornati i sistemi https://t.co/9o15fiA2fz
@csirt_it
19 Jan 2026
202 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Dissecting and Exploiting CVE-2025-62507: Remote Code Execution in Redis https://t.co/8qR7YOGmLC via @jfrog #infosec
@allaboutclait
17 Jan 2026
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Redis RCE vulnerability (CVE-2025-62507) exposes systems to unauthenticated attacks via buffer overflow. BaoLoader malware exploits trusted certificates and cloud platforms for stealth. China bans foreign cybersecurity tools. #RedisVuln #BaoLoader https://t.co/0ZgtnAsgvH
@TweetThreatNews
16 Jan 2026
96 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 ThreatsDay Bulletin: AI Voice-Cloning Evasion, Wi-Fi “Kill Switch,” Delta PLC Critical CVEs & More This week’s roundup highlights high-impact risks including an unauth Redis RCE (CVE-2025-62507), a Broadcom Wi-Fi DoS that can drop entire networks with one frame, an
@ThreatSynop
15 Jan 2026
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Can you trust CVSS scores to tell the whole story? 🔎 🚨 The JFrog Security Research team has dissected CVE-2025-62507, a Redis vulnerability with more to its 8.8 CVSS score than meets the eye. 🛡️ 3200+ servers fully exposed, with no authentication required 🛡️ 1
@jfrog
14 Jan 2026
154 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
#VulnerabilityReport #CVE202562507 AI-Discovered Flaw: Redis Flaw (CVE-2025-62507) Allows Remote Code Execution via Stack Buffer Overflow https://t.co/V9qRNC8VeZ
@Komodosec
10 Dec 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
>Redis社は CVE-2025-62507 の発見を、Google DeepMind と Project Zero が共同開発したAIセキュリティエージェントGoogle Big Sleepによるものだとしている
@ETomatot24044
13 Nov 2025
85 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
RedisのXACKDEL実装に深刻な脆弱性(CVE-2025-62507) https://t.co/J1epc0v7Bd #セキュリティ対策Lab #セキュリティ #Security
@securityLab_jp
7 Nov 2025
58 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-62507 Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a st… https://t.co/F97tLgjpg7
@CVEnew
4 Nov 2025
261 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Redis patched a High-severity RCE flaw (CVE-2025-62507) in XACKDEL, allowing remote code execution via a stack buffer overflow on a stream ID list. The bug was discovered by Google Big Sleep. #Redis #RCE #GoogleBigSleep #Cybersecurity https://t.co/bcTECQRg1y
@the_yellow_fall
4 Nov 2025
270 Impressions
0 Retweets
6 Likes
1 Bookmark
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9682570D-1383-47DD-808E-7D75B67BDE73",
"versionEndExcluding": "8.2.3",
"versionStartIncluding": "8.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]