A stack buffer overflow in Redis (CVE-2025-62507, CVSS 8.8) allows remote code execution through the XACKDEL command introduced in version 8.2. While the initial advisory suggested authentication mitigates the risk, JFrog researchers demonstrated that full RCE is achievable, and many Redis deployments run without authentication enabled.

Vulnerability overview

AttributeValue
CVECVE-2025-62507
CVSS v3 score8.8 (High)
CVSSv4 score7.7 (High)
TypeStack Buffer Overflow
Affected commandXACKDEL
Exploit complexityLow
AuthenticationRequired (but often absent)
Fixed versionsRedis 8.2.3, 8.3.2

Discovery by Google Big Sleep

CVE-2025-62507 was discovered by Google Big Sleep, an AI security agent jointly developed by Google DeepMind and Project Zero. Big Sleep acts as an automated security researcher to find and report unknown security vulnerabilities in software.

AttributeDetails
DiscovererGoogle Big Sleep
OrganizationsGoogle DeepMind + Project Zero
TypeAI-powered vulnerability research
SignificanceNotable AI-discovered vulnerability with practical exploit chain

This represents one of the more significant AI-discovered vulnerabilities with a demonstrated practical exploitation path.

Technical details

The XACKDEL command was added in Redis 8.2 to simplify stream cleanup by combining acknowledge and delete operations.

Root cause

ElementDescription
Vulnerable functionXACKDEL implementation
Buffer typeFixed-size stack array (static_ids)
FlawNo verification that ID count fits within array
TriggerSupplying more IDs than STREAMID_STATIC_VECTOR_LEN
Memory failureNo reallocation when count exceeds limit

The implementation allocates a fixed-size array on the stack to store parsed message IDs but fails to verify the number of IDs provided by the client fits within this array. Redis identified that the flaw occurs when the XACKDEL implementation fails to properly reallocate memory for a large number of stream IDs.

Overflow mechanics

StepDescription
1Attacker sends XACKDEL with excessive stream IDs
2Code skips reallocation when count exceeds STREAMID_STATIC_VECTOR_LEN
3Write operation exceeds buffer boundary
4Stack contents overwritten, including return address

When more IDs are supplied than the array can hold, the function writes past the buffer boundary. Because parsed stream IDs consist of two attacker-controlled numeric values, an attacker can precisely control what gets written to the stack.

Single-command exploitation

FactorDetail
Trigger methodSingle XACKDEL command
Default configExploitable without configuration changes
Authentication defaultRedis does not enforce authentication by default
ResultUnauthenticated remote code execution

In affected versions, this condition can be triggered remotely in the default Redis configuration by sending a single XACKDEL command containing a sufficiently large number of message IDs.

JFrog RCE demonstration

The initial CVSS scoring assumed “Privileges Required,” suggesting authentication would limit exploitability. JFrog’s security research team investigated further.

JFrog findings

FindingImplication
Overflow allows overwriting saved registersControl flow hijacking possible
Return addresses can be overwrittenCode execution achievable
Stream ID structure enables precise memory controlReliable exploitation
Full RCE demonstratedCritical urgency warranted

“Since the parsed stream IDs are fully attacker controlled, the overflow does not merely corrupt adjacent data; it allows an attacker to overwrite sensitive stack contents, including saved registers and the function’s return address. The structure of stream IDs, which are parsed as two independent numeric values, makes it possible to precisely control the overwritten memory and successfully get Remote Code Execution.” — JFrog Security Research

Why authentication doesn’t mitigate the risk

RealityImpact
Redis defaults to no authenticationDirect exploitation possible
Many deployments run without authenticationStandard practice in dev/internal
Authenticated users may include untrusted codeApplications can trigger vulnerability
Internal network access often treated as trustedLateral movement enables exploitation
Cloud/container deployments may expose RedisInternet-accessible instances

Shachar Menashe, VP of Security Research at JFrog, noted that cybersecurity teams should deploy firewalls to protect older Redis versions if immediate upgrade isn’t possible.

Compilation security

JFrog also noted that developers should ensure security mitigations are enabled during compilation:

MitigationImplementation
Stack canary protectionAdd -fstack-protector flag with gcc
ASLREnabled by default on modern systems
DEP/NXPrevents execution of stack memory

These mitigations can make exploitation more difficult but do not eliminate the vulnerability—patching remains essential.

Affected versions

Version rangeStatus
Redis < 8.2.0Not affected (XACKDEL didn’t exist)
Redis 8.2.0 - 8.2.2Vulnerable
Redis 8.2.3Fixed
Redis 8.3.0 - 8.3.1Vulnerable
Redis 8.3.2+Fixed

Mitigation options

Primary recommendation

Upgrade to Redis 8.2.3 or 8.3.2 as soon as possible.

If immediate upgrade isn’t feasible

MitigationImplementation
Restrict XACKDEL via ACLACL SETUSER default -XACKDEL
Enable authenticationRequire auth for all connections
Network segmentationIsolate Redis from untrusted networks
Firewall protectionLimit access to Redis ports

ACL configuration example

ACL SETUSER default -XACKDEL

This prevents users from executing the XACKDEL operation without requiring a full upgrade.

Deployment context

Redis is one of the most widely deployed in-memory data stores, used for:

Use caseRisk level
CachingModerate (often internal)
Session managementHigh (contains auth data)
Message queuingModerate
Real-time analyticsModerate
Development environmentsHigh (often no auth)

Common misconfigurations

IssuePrevalence
No authentication enabledVery common in dev/internal
Exposed to internal networkStandard practice
Accessible from application serversBy design
Internet-exposed (cloud misconfig)Less common but exists

Production deployment statistics

Redis powers millions of applications globally, making this vulnerability high-impact:

FactorScale
Global deploymentsMillions
Cloud provider managed instancesHigh
Container/Kubernetes deploymentsGrowing
Legacy unpatched instancesCommon

Redis security best practices

PracticeImplementation
Always enable authenticationrequirepass or ACLs
Bind to specific interfacesNot 0.0.0.0
Use TLS for connectionstls-port configuration
Apply ACLs for least privilegeRestrict command access
Network isolationFirewall and segmentation
Regular patchingMonitor Redis security advisories
Disable dangerous commandsrename-command or ACLs

Timeline

DateEvent
Late 2025Google Big Sleep discovers vulnerability
December 2025Redis notified
January 2026CVE-2025-62507 published
January 2026JFrog demonstrates full RCE
January 2026Redis 8.2.3 and 8.3.2 released with fix

Recommendations

For Redis operators

PriorityAction
CriticalUpgrade to Redis 8.2.3 or 8.3.2
CriticalIf upgrade delayed, apply ACL restriction
HighAudit authentication configuration
HighReview network exposure
MediumImplement monitoring for anomalous commands
MediumVerify compilation security flags

For security teams

PriorityAction
HighInventory all Redis deployments
HighVerify version and patch status
MediumReview Redis access patterns
OngoingMonitor for exploitation attempts

Detection opportunities

IndicatorDetection method
Large XACKDEL commandsCommand auditing
Unusual stream operationsBehavioral monitoring
Crash/restart patternsProcess monitoring
Memory corruption signsCore dump analysis

Context

The assumption that “authentication required” meaningfully reduces risk doesn’t hold when:

  • Many deployments run without authentication
  • Authenticated users may include untrusted application code
  • Internal network access is often treated as trusted
  • Cloud misconfigurations can expose services
Risk factorStatus
Default configuration exploitableYes
Single command triggerYes
Precise memory controlYes
Full RCE demonstratedYes
Authentication defaultNone

Organizations should treat CVE-2025-62507 as a critical priority regardless of authentication status. The JFrog RCE demonstration confirms this is not a theoretical risk but a practical, exploitable vulnerability.

The Google Big Sleep discovery also highlights the emerging role of AI in vulnerability research—security teams should anticipate that AI-assisted vulnerability discovery will accelerate the pace of zero-day disclosure across the software ecosystem.