CVE-2025-62507

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-62507
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62507.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-62507
Aliases
Downstream
Published
2025-11-04T21:24:44.802Z
Modified
2025-12-05T10:21:18.978234Z
Severity
  • 7.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Redis: Bug in XACKDEL may lead to stack overflow and potential RCE
Details

Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-121",
        "CWE-20"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62507.json"
}
References

Affected packages

Git / github.com/redis/redis

Affected ranges

Type
GIT
Repo
https://github.com/redis/redis
Events

Affected versions

8.*

8.2.0
8.2.1
8.2.1-int
8.2.2
8.2.2-int