Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2025-46818Code Injection in Redis

Severity
7.3HIGHNVD
OSV8.8
EPSS
3.2%
top 13.02%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedOct 3
Latest updateMar 24

Description

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This ca

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:HExploitability: 1.3 | Impact: 5.9

Affected Packages18 packages

CVEListV5redis/redis< 8.2.2
NVDredis/redis7.07.2.11+4
debiandebian/redis< redict 7.3.6+ds-1 (forky)
Debianredis/redis< 5:7.0.15-1~deb12u6+2

Patches

🔴Vulnerability Details

2
OSV
valkey vulnerabilities2025-11-26
OSV
CVE-2025-46818: Redis is an open source, in-memory database that persists on disk2025-10-03

💥Exploits & PoCs

1
Nuclei
Redis Lua Sandbox < 8.2.2 - Cross-User Escape

📋Vendor Advisories

6
CISA ICS
Schneider Electric Plant iT/Brewmaxx2026-03-24
Ubuntu
Valkey vulnerabilities2025-11-26
Microsoft
Redis: Authenticated users can execute LUA scripts as a different user2025-10-14
Red Hat
Redis: Redis: Authenticated users can execute LUA scripts as a different user2025-10-03
Debian
CVE-2025-46818: redict - Redis is an open source, in-memory database that persists on disk. Versions 8.2....2025

🕵️Threat Intelligence

2
Bleepingcomputer
Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 172 flaws2025-10-14
Greynoiseio
NoiseLetter October 2025
CVE-2025-46818 — Code Injection in Redis | cvebase