Impact
The vulnerability is a use‑after‑free (CWE-416) in the unblock client flow. When a blocked client is evicted, the server invokes processCommandAndResetClient again and ignores an error return. This allows an attacker who can authenticate to the server to corrupt memory and execute arbitrary code.
Affected Systems
Redis server builds from version 7.2.0 up to, but not including, 8.6.3 are vulnerable. The affected product is redis:redis, with all releases between 7.2.0 and 8.6.3 inclusive.
Risk and Exploitability
The CVSS score of 7.7 indicates high severity, and the EPSS score is not available, so the likelihood of exploitation is uncertain. The vulnerability is not listed in the CISA KEV catalog. The attack requires the attacker to authenticate and target a blocked client that is evicted; the exploit path can be triggered through normal client commands.
OpenCVE Enrichment