High severity8.1NVD Advisory· Published May 5, 2026· Updated May 6, 2026
CVE-2026-23631
CVE-2026-23631
Description
Redis is an in-memory data structure store. In all versions of redis-server with Lua scripting, an authenticated attacker can exploit the master-replica synchronization mechanism to trigger a use-after-free on replicas where replica-read-only is disabled or can be disabled, which may lead to remote code execution. A workaround is to prevent users from executing Lua scripts or avoid using replicas where replica-read-only is disabled. This is patched in version 8.6.3.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/redis/redis/security/advisories/GHSA-8ghh-qpmp-7826nvdMitigationVendor Advisory
- github.com/redis/redis/releases/tag/8.6.3nvdRelease Notes
News mentions
1- Patch Tuesday - May 2026Rapid7 Blog · May 13, 2026