Description
Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
INFO
Published Date :
2025-11-04T21:24:44.802Z
Last Modified :
2025-11-06T04:55:34.815Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-62507 vulnerability.
| Vendors | Products |
|---|---|
| Redis |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-62507.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact