Skip to content

Critical 'RediShell' Flaw Affects 60,000 Redis Servers

Unpatched Redis servers face serious risk. Act now to prevent data breaches and system compromises.

In the middle of the picture there is an insect. The insect is on a red surface.
In the middle of the picture there is an insect. The insect is on a red surface.

Critical 'RediShell' Flaw Affects 60,000 Redis Servers

A critical security flaw, 'RediShell', has been discovered in Redis, affecting approximately 60,000 servers worldwide. Redis, used by about 75% of cloud environments, has around 330,000 instances exposed to the internet, with about 60,000 not protected by any authentication. The vulnerability, CVE-2025-49844, has a severity score of 10.0 under the CVSS. Redis and Wiz jointly disclosed the flaw on October 3, urging administrators to patch immediately.

The flaw, present for 13 years, is a use-after-free vulnerability in Redis's embedded Lua scripting engine. Authenticated attackers can exploit it to upload Lua scripts, escape the sandbox, and execute arbitrary code on the host. Past attacks on Redis servers include the deployment of cryptocurrency miners and ransomware. Fixes are available for various Redis versions, and the company advises applying updates and implementing additional safeguards.

The discovery of RediShell highlights the importance of keeping software up-to-date and implementing strong authentication measures. With around 60,000 Redis instances exposed and unprotected, administrators are urged to address this critical vulnerability promptly to prevent potential data breaches and system compromises.

Read also:

Latest