Redis is an in-memory data structure store. In all versions of redis-server with Lua scripting, an authenticated attacker can exploit the master-replica synchronization mechanism to trigger a use-after-free on replicas where replica-read-only is disabled or can be disabled, which may lead to remote code execution. A workaround is to prevent users from executing Lua scripts or avoid using replicas where replica-read-only is disabled. This is patched in version 8.6.3.
Metrics
Affected Vendors & Products
References
History
Tue, 05 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redis
Redis redis |
|
| Vendors & Products |
Redis
Redis redis |
Tue, 05 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Redis is an in-memory data structure store. In all versions of redis-server with Lua scripting, an authenticated attacker can exploit the master-replica synchronization mechanism to trigger a use-after-free on replicas where replica-read-only is disabled or can be disabled, which may lead to remote code execution. A workaround is to prevent users from executing Lua scripts or avoid using replicas where replica-read-only is disabled. This is patched in version 8.6.3. | |
| Title | redis-server Lua use-after-free may allow remote code execution | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-05T16:39:32.337Z
Reserved: 2026-01-14T16:08:37.482Z
Link: CVE-2026-23631
No data.
Status : Awaiting Analysis
Published: 2026-05-05T17:17:03.503
Modified: 2026-05-05T19:38:32.193
Link: CVE-2026-23631
No data.
OpenCVE Enrichment
Updated: 2026-05-05T18:30:29Z