CVE-2026-23479
Published: 05 May 2026
Summary
CVE-2026-23479 is a high-severity Use After Free (CWE-416) vulnerability in Redis Redis. Its CVSS base score is 8.8 (High).
Operationally, ranked at the 27.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Use-after-free exploits that achieve arbitrary code execution are blocked or significantly hardened by non-executable pages and ASLR.
NVD Description
Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an…
more
authenticated attacker can trigger a use-after-free that may lead to remote code execution. This has been patched in version 8.6.3.
Deeper analysisAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)