VYPR
High severity8.1NVD Advisory· Published May 5, 2026· Updated May 6, 2026

CVE-2026-23631

CVE-2026-23631

Description

Redis is an in-memory data structure store. In all versions of redis-server with Lua scripting, an authenticated attacker can exploit the master-replica synchronization mechanism to trigger a use-after-free on replicas where replica-read-only is disabled or can be disabled, which may lead to remote code execution. A workaround is to prevent users from executing Lua scripts or avoid using replicas where replica-read-only is disabled. This is patched in version 8.6.3.

Affected products

2
  • Redis/Redisreferences2 versions
    (expand)+ 1 more
    • (no CPE)
    • cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*range: <8.6.3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

1