RediShell: Critical Redis RCE Vulnerability CVE-2025-49844 Exploits 13-Year-Old UAF Bug

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

A critical Redis RCE flaw, identified as CVE-2025-49844 and named RediShell, resides in the widely used Redis in-memory data store and carries the highest possible CVSS severity score of 10.0. The flaw stems from a Use-After-Free (UAF) memory corruption bug that has existed in the Redis source code for approximately 13 years. 

Potential Risks and Impact

An attacker who has authenticated to a Redis instance can exploit this RCE vulnerability by sending a specially crafted Lua script. This allows them to escape the confines of the Lua sandbox and achieve arbitrary native code execution on the host machine, Wiz Research has uncovered.

The impact of the RediShell exploit is severe, granting an attacker complete control over the compromised host system. This level of access enables the exfiltration, deletion, or encryption of sensitive data stored both in Redis and on the host. 

Attack flow and impact | Source: Wiz Research

Furthermore, an attacker could hijack system resources for activities like cryptomining or use the compromised machine as a pivot point for lateral movement within a cloud environment. 

With Redis used in an estimated 75% of cloud environments and many instances running with default insecure configurations (such as no authentication), the potential attack surface is extensive:

In response to the discovery, Redis released a security advisory and patched versions on October 3. Organizations are strongly urged to update all Redis instances immediately, prioritizing those exposed to the internet or operating without authentication. 

Recommended security hardening measures for CVE-2025-49844 include:

In September, a critical TP-Link zero-day exposed millions of routers to full system takeover and RCE flaws were found in Cisco SNMP XE software and in Ivanti Endpoint Manager Mobile (EPMM).


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: