Description
RedisBloom is a probabilistic data structures module for Redis. In all versions of RedisBloom before 2.8.20, the module does not properly validate serialized values processed through the Redis RESTORE command. An authenticated attacker with permission to execute RESTORE on a server with the RedisBloom module loaded can supply a crafted serialized payload that triggers invalid memory access and may lead to remote code execution. A workaround is to restrict access to the RESTORE command with ACL rules. This issue is fixed in version 2.8.20.
Published: 2026-05-05
Score: 7.7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

RedisBloom, a Redis module that provides probabilistic data structures, contains an invalid memory access bug triggered by the RESTORE command. An authenticated attacker who can execute RESTORE can supply a crafted serialized payload that causes the module to dereference memory incorrectly, potentially allowing the attacker to execute arbitrary code on the host running Redis. The weakness is a classic unvalidated input vulnerability (CWE‑122), leading to a high severity outcome. The impact is full control of the affected server, including data destruction, persistence, and lateral movement. The system confidentiality, integrity, and availability are all compromised once the exploit succeeds.

Affected Systems

All deployments of RedisBloom before version 2.8.20 are affected. The bug exists in the RedisBloom module when used with any Redis instance that has the module loaded; any user with the appropriate ACL permissions to issue RESTORE commands is at risk. The patch is distributed as part of RedisBloom 2.8.20, which validates serialized values correctly.

Risk and Exploitability

The CVSS score of 7.7 indicates a high risk of exploitation, although the EPSS score is not available. The vulnerability is not listed in the CISA KEV catalog. The attack requires an authenticated user with RESTORE privileges, which is typically a local or network administrator level. Once such a user can run RESTORE, the crafted payload can lead to remote code execution. The lack of publicly known exploits suggests the CDS may be low to moderate, but the high severity and requirement of privileged access make it a priority for immediate attention in environments with untrusted users.

Generated by OpenCVE AI on May 5, 2026 at 18:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to RedisBloom version 2.8.20 or newer to apply the validation fix for RESTORE command
  • If an upgrade is not immediately possible, restrict the RESTORE command using Redis ACL rules so that only trusted administrators may invoke it
  • Continuously monitor Redis logs and traffic for anomalous RESTORE activity and verify that no unauthorized serialization payloads are processed

Generated by OpenCVE AI on May 5, 2026 at 18:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 May 2026 17:15:00 +0000

Type Values Removed Values Added
Description RedisBloom is a probabilistic data structures module for Redis. In all versions of RedisBloom before 2.8.20, the module does not properly validate serialized values processed through the Redis RESTORE command. An authenticated attacker with permission to execute RESTORE on a server with the RedisBloom module loaded can supply a crafted serialized payload that triggers invalid memory access and may lead to remote code execution. A workaround is to restrict access to the RESTORE command with ACL rules. This issue is fixed in version 2.8.20.
Title RedisBloom RESTORE invalid memory access may allow remote code execution
Weaknesses CWE-122
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-05T18:49:30.919Z

Reserved: 2026-02-03T01:02:46.716Z

Link: CVE-2026-25589

cve-icon Vulnrichment

Updated: 2026-05-05T18:49:24.484Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-05T17:17:03.940

Modified: 2026-05-05T19:38:32.193

Link: CVE-2026-25589

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T18:30:29Z

Weaknesses