VYPR
High severity8.8NVD Advisory· Published May 5, 2026· Updated May 6, 2026

CVE-2026-25243

CVE-2026-25243

Description

Redis is an in-memory data structure store. In versions of redis-server up to 8.6.3, the RESTORE command does not properly validate serialized values. An authenticated attacker with permission to execute RESTORE can supply a crafted serialized payload that triggers invalid memory access and may lead to remote code execution. A workaround is to restrict access to the RESTORE command with ACL rules. This is patched in version 8.6.3.

Affected products

2
  • Redis/Redisreferences2 versions
    (expand)+ 1 more
    • (no CPE)
    • cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*range: <8.6.3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

1