CVE-2025-62507
Redis vulnerability analysis and mitigation

Overview

Redis version 8.2 and later contains a high-severity vulnerability (CVE-2025-62507, CVSSv4 7.7) that could allow remote code execution (RCE) under specific conditions. The vulnerability was discovered by Google Big Sleep, an AI security agent jointly developed by Google DeepMind and Project Zero, and was patched in Redis version 8.2.3 (SecurityOnline, GitHub Advisory).

Technical details

The vulnerability stems from a stack buffer overflow triggered by improper input handling in the XACKDEL command, which is used in stream message acknowledgment and deletion. The flaw occurs when the XACKDEL implementation fails to properly reallocate memory for a large number of stream IDs that exceeds the STREAMIDSTATICVECTOR_LEN. The code skips a necessary reallocation, leading to a stack buffer overflow condition (SecurityOnline, GitHub Commit).

Impact

An attacker with access to the Redis CLI or API could exploit this vulnerability by passing an excessively large list of IDs to XACKDEL, potentially achieving arbitrary code execution in the context of the Redis process. The vulnerability has been assigned a high severity rating with a CVSSv4 score of 7.7, indicating significant potential impact on system confidentiality, integrity, and availability (GitHub Advisory).

Mitigation and workarounds

Redis has released version 8.2.3 which contains the fix for this vulnerability. For users unable to immediately update, a temporary workaround is available using Redis' Access Control Lists (ACLs) to prevent users from executing the XACKDEL operation. This can be implemented by restricting the XACKDEL command through ACL configuration (SecurityOnline, GitHub Release).

Additional resources


SourceThis report was generated using AI

Related Redis vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-49844CRITICAL9.9
  • RedisRedis
  • redis7
NoYesOct 03, 2025
CVE-2025-46817HIGH8.8
  • RedisRedis
  • valkey-debugsource
NoYesOct 03, 2025
CVE-2025-62507HIGH7.7
  • RedisRedis
  • cpe:2.3:a:redis:redis
NoYesNov 04, 2025
CVE-2025-46818HIGH7.3
  • RedisRedis
  • redis6-debugsource
NoYesOct 03, 2025
CVE-2025-46819HIGH7.1
  • RedisRedis
  • redis-devel
NoYesOct 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management