CVE-2025-46819

6.3 MEDIUM

📋 TL;DR

This vulnerability in Redis allows authenticated users to execute specially crafted LUA scripts that can read out-of-bounds memory or crash the server, causing denial of service. It affects all Redis versions with Lua scripting enabled, specifically versions 8.2.1 and below. Organizations running vulnerable Redis instances with authenticated user access are at risk.

💻 Affected Systems

Products:
  • Redis
Versions: All versions up to and including 8.2.1
Operating Systems: All operating systems running Redis
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Lua scripting capability and authenticated user access. Redis instances with default configurations that allow Lua script execution are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server crash leading to extended denial of service, potential memory disclosure of sensitive data, and system instability requiring manual intervention.

🟠

Likely Case

Server crashes causing temporary denial of service, requiring restart and potentially disrupting dependent applications.

🟢

If Mitigated

Minimal impact if Lua scripting is disabled or proper ACL restrictions are in place, with only authenticated users affected.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of crafting malicious LUA scripts. The vulnerability is in the Lua scripting engine implementation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.2.2

Vendor Advisory: https://github.com/redis/redis/security/advisories/GHSA-4c68-q8q8-3g4f

Restart Required: Yes

Instructions:

1. Download Redis 8.2.2 or later from official sources. 2. Stop the Redis service. 3. Install the updated version. 4. Restart the Redis service. 5. Verify the version is 8.2.2 or higher.

🔧 Temporary Workarounds

Disable Lua Script Execution via ACL

all

Prevent users from executing Lua scripts by restricting EVAL and FUNCTION command families using Redis ACL.

ACL SETUSER <username> -@scripting
ACL SETUSER <username> -@function

🧯 If You Can't Patch

  • Implement strict ACL rules to block all users from executing Lua scripts using -@scripting and -@function
  • Monitor Redis logs for unusual LUA script execution patterns and implement network segmentation to limit access

🔍 How to Verify

Check if Vulnerable:

Check Redis version and verify if Lua scripting is enabled. Versions 8.2.1 and below with Lua enabled are vulnerable.

Check Version:

redis-cli --version

Verify Fix Applied:

Confirm Redis version is 8.2.2 or higher and test that Lua scripts execute without causing crashes or memory issues.

📡 Detection & Monitoring

Log Indicators:

  • Unusual LUA script execution patterns
  • Redis server crash logs
  • Memory access violation errors in Redis logs

Network Indicators:

  • Increased EVAL command usage from authenticated users
  • Unexpected server restarts

SIEM Query:

source="redis" AND (command="EVAL" OR command="FUNCTION") | stats count by src_ip

🔗 References

📤 Share & Export