Cyber Posture

CVE-2026-25243

High

Published: 05 May 2026

Published
05 May 2026
Modified
06 May 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0008 24.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25243 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Redis Redis. Its CVSS base score is 8.8 (High).

Operationally, ranked at the 24.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

NVD Description

Redis is an in-memory data structure store. In versions of redis-server up to 8.6.3, the RESTORE command does not properly validate serialized values. An authenticated attacker with permission to execute RESTORE can supply a crafted serialized payload that triggers invalid…

more

memory access and may lead to remote code execution. A workaround is to restrict access to the RESTORE command with ACL rules. This is patched in version 8.6.3.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

Affected Products

redis
redis
≤ 8.6.3

CVEs Like This One

CVE-2026-23631Same product: Redis Redis
CVE-2025-46817Same product: Redis Redis
CVE-2025-62507Same product: Redis Redis
CVE-2026-23479Same product: Redis Redis
CVE-2025-49844Same product: Redis Redis
CVE-2024-46981Same product: Redis Redis
CVE-2026-23719Shared CWE-122
CVE-2025-35984Shared CWE-122
CVE-2025-21239Shared CWE-122
CVE-2026-7900Shared CWE-122

References