Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4325-1 | redis security update |
Debian DSA |
DSA-6020-1 | redis security update |
Debian DSA |
DSA-6022-1 | valkey security update |
EUVD |
EUVD-2025-32327 | Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 31 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 10 Oct 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 | |
| CPEs | cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* |
Mon, 06 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redis
Redis redis |
|
| Vendors & Products |
Redis
Redis redis |
Mon, 06 Oct 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 03 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families. | |
| Title | Redis is vulnerable to DoS via specially crafted LUA scripts | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-31T14:53:41.010Z
Reserved: 2025-04-30T19:41:58.134Z
Link: CVE-2025-46819
Updated: 2025-10-31T14:53:41.010Z
Status : Modified
Published: 2025-10-03T19:15:43.490
Modified: 2025-10-31T15:15:41.913
Link: CVE-2025-46819
OpenCVE Enrichment
Updated: 2025-10-06T14:42:29Z
Debian DLA
Debian DSA
EUVD