Skip to content
CVSS 8.8 · HIGH

CVE-2026-23479

Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an authenticated attacker can trigger a use-after-free that may lead to remote code execution. This has been patched in version 8.6.3.

View on NVD

Analysis

Redis versions 7.2.0 through 8.6.2 are vulnerable to a remote code execution flaw triggered by an authenticated attacker during client unblocking flows. If you use Redis as a cache or message broker, you should upgrade to version 8.6.3 to mitigate the risk of server compromise via use-after-free exploitation.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-416

EPSS

Probability of exploitation (next 30 days): 0.0010 (0.1%)
Percentile: 27.8%
EPSS: 2026-05-06

Affects

redis:redis

Technical description

Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an authenticated attacker can trigger a use-after-free that may lead to remote code execution. This has been patched in version 8.6.3.

Published: 5/5/2026, 5:17:02 PM
Last modified: 5/6/2026, 3:53:38 PM

References

HomeEventsBlogResourcesTeam