Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
{
"cwe_ids": [
"CWE-121",
"CWE-20"
]
}[
{
"deprecated": false,
"source": "https://github.com/redis/redis/commit/5f83972188f6e5b1d6f1940218c650a9cbdf7741",
"id": "CVE-2025-62507-8dda5ca6",
"signature_version": "v1",
"target": {
"function": "xackdelCommand",
"file": "src/t_stream.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "184981250021505204310658382932789911777",
"length": 2108.0
}
},
{
"deprecated": false,
"source": "https://github.com/redis/redis/commit/5f83972188f6e5b1d6f1940218c650a9cbdf7741",
"id": "CVE-2025-62507-a69c1c1d",
"signature_version": "v1",
"target": {
"file": "src/t_stream.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"37992495249938891560898647564601714609",
"329678821821074785238540876366894256146",
"122806087588382097778337917458865251391",
"268942351403239880169801664891435176436"
],
"threshold": 0.9
}
}
]