CVE-2026-25243 PUBLISHED

redis-server RESTORE invalid memory access may allow remote code execution

Assigner: GitHub_M
Reserved: 30.01.2026 Published: 05.05.2026 Updated: 06.05.2026

Redis is an in-memory data structure store. In versions of redis-server up to 8.6.3, the RESTORE command does not properly validate serialized values. An authenticated attacker with permission to execute RESTORE can supply a crafted serialized payload that triggers invalid memory access and may lead to remote code execution. A workaround is to restrict access to the RESTORE command with ACL rules. This is patched in version 8.6.3.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 7.7

Product Status

Vendor redis
Product redis
Versions
  • Version < 8.6.3 is affected

References

Problem Types

  • CWE-122: Heap-based Buffer Overflow CWE