RedisShell:Redis 存在严重远程代码执行漏洞
RediShell: Critical remote code execution vulnerability in Redis

原始链接: https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844

## 关键 Redis 漏洞:RediShell (CVE-2025-49844) Wiz Research 发现了一个关键的远程代码执行 (RCE) 漏洞,名为 #RediShell (CVE-2025-49844),存在于广泛使用的内存数据存储 Redis 中。该漏洞源于一个 13 年前的 Use-After-Free 缺陷,CVSS 评分为 10.0 – 最高严重级别 – 允许攻击者通过精心设计的 Lua 脚本在 Redis 主机上执行任意代码。 影响范围广泛,估计有 330,000 个 Redis 实例暴露在互联网上,其中 60,000 个没有身份验证。成功利用将授予完全的系统访问权限,从而实现数据盗窃、恶意软件安装以及在 Redis 普遍存在的云环境中的横向移动(估计 75% 的云部署)。 Redis 于 10 月 3 日发布了补丁,**强烈建议立即更新**,优先更新暴露在互联网上且未进行身份验证的实例。组织还应启用身份验证,禁用不必要的命令(如未使用时禁用 Lua 脚本),并实施网络级别的访问控制。Wiz 客户可以利用 Wiz 威胁中心进行风险评估和识别易受攻击的实例。Wiz Research 将在稍后日期发布更多技术细节。

## Redis 漏洞总结 (RediShell) Redis 中发现了一个关键的远程代码执行 (RCE) 漏洞,名为“RediShell”。该漏洞是 Lua 脚本引擎中的一个认证后使用后释放 (UAF) 缺陷,可能允许攻击者执行任意代码。虽然被评为 CVSS 评分为 10,但许多安全专业人士争论其实际严重性,认为该评分被夸大了。 利用需要攻击者发送恶意 Lua 脚本,并且在允许执行不受信任的 Lua 脚本的配置中最具影响——这是一种罕见的做法。许多评论员指出,使用身份验证并仅运行受信任脚本的典型 Redis 部署可能不会受到影响。 该漏洞已在 Redis 8.1.4 版本和 Valkey(Redis 的一个分支)中得到修复。人们对修复响应时间长达 140 天表示担忧。讨论还涉及 Redis 使用的 Lua 解释器的年龄以及迁移到更新版本或不同语言(如 Rust)的潜在好处。
相关文章

原文

Wiz Research has uncovered a critical Remote Code Execution (RCE) vulnerability, CVE-2025-49844 which we've dubbed #RediShell, in the widely used Redis in-memory data structure store. The vulnerability has been assigned a CVSS score of 10.0 - the highest possible severity.

The vulnerability exploits a Use-After-Free (UAF) memory corruption bug that has existed for approximately 13 years in the Redis source code. This flaw allows a post auth attacker to send a specially crafted malicious Lua script (a feature supported by default in Redis) to escape from the Lua sandbox and achieve arbitrary native code execution on the Redis host. This grants an attacker full access to the host system, enabling them to exfiltrate, wipe, or encrypt sensitive data, hijack resources, and facilitate lateral movement within cloud environments.

Given that Redis is used in an estimated 75% of cloud environments, the potential impact is extensive. Organizations are strongly urged to patch instances immediately by prioritizing those that are exposed to the internet.

On October 3, Redis released a security advisory along with a patched version of Redis. We extend our gratitude to the entire Redis team for their collaboration throughout the disclosure process. We greatly appreciate their transparency, responsiveness, and partnership during this engagement.

In this post, we will provide a high-level overview of our discovery and its implications. Given the prevalence and sensitivity of this vulnerability, we will defer some of the technical details to a future installment, omitting exploit information for now to allow impacted organizations sufficient time to address the vulnerability.

Organizations utilizing Redis are strongly encouraged to update their Redis instances to the latest version immediately.

Vulnerability Meets Ubiquity: The Redis Risk Multiplier

The newly disclosed RediShell (CVE-2025-49844) vulnerability in Redis has been assigned a CVSS score of 10.0 - a rating rarely seen, with only around 300 vulnerabilities receiving it in the past year. It’s also the first Redis vulnerability to be rated as critical. The score reflects not just the technical severity of remote code execution, but also how Redis is commonly used and deployed. Redis is widely used in cloud environments for caching, session management, and pub/sub messaging. While Redis has had a strong security history, the combination of this flaw and common deployment practices significantly increases its potential impact.

Scope

Wiz Research discovered a Remote Code Execution vulnerability CVE-2025-49844 affecting the widely used Redis database. The vulnerability is a Use-After-Free (UAF) memory corruption that allows an attacker to send a malicious Lua script that leads to arbitrary code execution outside Redis’s Lua interpreter sandbox, gaining access to the host.

The urgency with which you should address this vulnerability depends on how Redis was installed and its exposure level.

Exposure Analysis

Our analysis across cloud environments revealed the extensive scope of this vulnerability:

Risk Assessment

Critical Risk - Internet-Exposed + Unauthenticated:

The official Redis container, by default, does not require authentication. Our analysis shows that 57% of cloud environments install Redis as an image. If not installed carefully, these instances may lack authentication entirely. The combination of no authentication and exposure to the internet is highly dangerous, allowing anyone to query the Redis instance and, specifically, send Lua scripts (which are enabled by default). This enables attackers to exploit the vulnerability and achieve RCE within the environment.

High Risk - Internal Network Exposure:

More Redis instances are exposed to internal networks where authentication may not be prioritized, allowing any host in the local network to connect to the database server. An attacker with a foothold in the cloud environment could gain access to sensitive data and exploit the vulnerability to run arbitrary code for lateral movement into sensitive networks.

Attack Flow and Impact

The attack sequence demonstrates how an attacker can exploit RediShell (CVE-2025-49844) to achieve comprehensive system compromise:

Initial Exploitation

Sandbox Escape

System Compromise

Lateral Movement

The Result: Host Remote Code Execution

**We recommend that all Redis users upgrade their instances immediately, as this vulnerability poses a significant risk.**

Disclosure Timeline


Recommended Actions

  1. Update Redis Immediately: Upgrade to the latest patched version. Prioritize any internet-exposed or unauthenticated instances.

  2. Security Hardening:

  3. Enable Redis Authentication: Use the requirepass directive.

  4. Disable Unnecessary Commands: This includes Lua scripting if it's not being used. You can achieve this by revoking user scripting permissions via Redis ACLs or by disabling scripting commands.

  5. Run with Minimal Privileges: Operate Redis using a non-root user account.

  6. Enable Logging and Monitoring: Activate Redis logging and monitoring to track activity and identify potential issues.

  7. Implement Network-Level Access Controls: Utilize firewalls and Virtual Private Clouds (VPCs).

  8. Restrict Redis Access: Limit access to authorized networks only.

How Wiz can help

Wiz customers can use the pre-built query and advisory in the Wiz Threat Center to assess the risk in their environment.

Wiz identifies both internal and publicly exposed Redis instances in your environment affected by CVE-2025-49844, and alerts you to instances that have been misconfigured to allow unauthenticated access or use weak or default passwords.

Conclusion: treat with urgency

RediShell (CVE-2025-49844) represents a critical security vulnerability that affects all Redis versions due to its root cause in the underlying Lua interpreter. With hundreds of thousands of exposed instances worldwide, this vulnerability poses a significant threat to organizations across all industries.

The combination of widespread deployment, default insecure configurations, and the severity of the vulnerability creates an urgent need for immediate remediation. Organizations must prioritize updating their Redis instances and implementing proper security controls to protect against exploitation.

This vulnerability also highlights how deeply today’s cloud environments depend on open-source technologies like Redis. That shared reliance is what motivated us, alongside other cloud providers, to launch ZeroDay.Cloud, a community-driven effort to identify and responsibly disclose critical zero-day vulnerabilities in the open-source software powering the cloud. Redis, along with other core open-source technologies, is part of that effort.

Wiz Research will continue to monitor the threat landscape and provide additional technical details in future publications so that organizations have time to implement necessary security measures.

For technical questions about this research, please contact: [email protected]

---

This research was conducted by the Wiz Research team. We thank the Redis security team for their professional handling of this disclosure and their commitment to user security.

联系我们 contact @ memedata.com