Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2025-32023 — Integer Overflow to Buffer Overflow in Redis
Severity
7.8HIGHNVD
EPSS
12.6%
top 6.02%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJul 7
Latest updateMar 24
Description
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without p…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages11 packages
Patches
🔴Vulnerability Details
1💥Exploits & PoCs
1📋Vendor Advisories
4Debian▶
CVE-2025-32023: redict - Redis is an open source, in-memory database that persists on disk. From 2.8 to b...↗2025