Cyber Posture

CVE-2026-23479

High

Published: 05 May 2026

Published
05 May 2026
Modified
06 May 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23479 is a high-severity Use After Free (CWE-416) vulnerability in Redis Redis. Its CVSS base score is 8.8 (High).

Operationally, ranked at the 27.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-416

Use-after-free exploits that achieve arbitrary code execution are blocked or significantly hardened by non-executable pages and ASLR.

NVD Description

Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an…

more

authenticated attacker can trigger a use-after-free that may lead to remote code execution. This has been patched in version 8.6.3.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

Affected Products

redis
redis
7.2.0 — 8.6.3

CVEs Like This One

CVE-2026-23631Same product: Redis Redis
CVE-2025-62507Same product: Redis Redis
CVE-2026-25243Same product: Redis Redis
CVE-2025-46817Same product: Redis Redis
CVE-2025-49844Same product: Redis Redis
CVE-2024-46981Same product: Redis Redis
CVE-2026-31446Shared CWE-416
CVE-2026-31532Shared CWE-416
CVE-2025-24855Shared CWE-416
CVE-2025-21304Shared CWE-416

References