CVE-2026-25589 PUBLISHED

RedisBloom RESTORE invalid memory access may allow remote code execution

Assigner: GitHub_M
Reserved: 03.02.2026 Published: 05.05.2026 Updated: 05.05.2026

RedisBloom is a probabilistic data structures module for Redis. In all versions of RedisBloom before 2.8.20, the module does not properly validate serialized values processed through the Redis RESTORE command. An authenticated attacker with permission to execute RESTORE on a server with the RedisBloom module loaded can supply a crafted serialized payload that triggers invalid memory access and may lead to remote code execution. A workaround is to restrict access to the RESTORE command with ACL rules. This issue is fixed in version 2.8.20.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 7.7

Product Status

Vendor RedisBloom
Product RedisBloom
Versions
  • Version < 2.8.20 is affected

References

Problem Types

  • CWE-122: Heap-based Buffer Overflow CWE