Redis RCE Exploit More Severe Than Initially Rated
JFrog researchers develop working remote code execution exploit for CVE-2025-62507, a stack buffer overflow in Redis discovered by Google's AI security agent.
A vulnerability in Redis initially rated high severity may warrant more urgent attention after JFrog researchers demonstrated a working remote code execution exploit. CVE-2025-62507, a stack buffer overflow in the XACKDEL command, allows unauthenticated attackers to compromise Redis instances running the default configuration.
The flaw affects Redis versions 8.2.0 through 8.2.2. The fix shipped in version 8.2.3, but the disclosure timeline has taken an interesting turn—the vulnerability was originally discovered by Google's Big Sleep AI security agent.
How the Exploit Works
The vulnerability exists in Redis's stream message acknowledgment and deletion functionality. The XACKDEL command handles cleanup of acknowledged messages, but when processing a large number of stream IDs, it fails to properly reallocate memory.
When the count of stream IDs exceeds STREAMID_STATIC_VECTOR_LEN, the code skips a necessary reallocation step. This causes parsed IDs to overflow the stack buffer, overwriting adjacent memory including saved registers and the function's return address.
Because stream IDs contain two independent numeric values that attackers fully control, the overflow allows precise manipulation of overwritten memory. JFrog's researchers achieved direct control of the instruction pointer, demonstrating reliable code execution.
Making matters worse, JFrog discovered that the official Redis Docker image ships without stack canary protections—a basic exploit mitigation that would normally complicate buffer overflow attacks.
Default Configuration Is Vulnerable
Redis historically does not enforce authentication by default. Combined with the unauthenticated nature of this vulnerability, attackers can trigger the flaw with a single XACKDEL command containing a sufficiently large number of message IDs.
Any Redis 8.2.x instance exposed to untrusted networks without authentication—a common configuration in development environments and unfortunately some production deployments—is vulnerable to complete compromise.
AI-Discovered Vulnerability
The original discovery came from Google Big Sleep, an AI security agent developed jointly by Google DeepMind and Project Zero. The system acts as an automated security researcher, hunting for unknown vulnerabilities in software.
Big Sleep's involvement highlights how AI tools are accelerating both sides of the security equation. Defenders gain automated vulnerability discovery; attackers potentially gain the same capability. The AI-discovered OpenSSL vulnerability we covered last week followed a similar pattern—automated analysis finding flaws that evaded human review.
Severity Reassessment Needed
The initial CVSS score of 8.8 reflected the buffer overflow's technical characteristics. JFrog argues the working RCE exploit should push organizations toward more urgent remediation.
"The discovery of an RCE exploit by JFrog researchers should increase the urgency for applying a patch," said Shachar Menashe, vice president of security research at JFrog. For organizations unable to immediately upgrade, Menashe recommends deploying firewalls to protect any older Redis versions running in production.
Mitigation Steps
Organizations running Redis 8.2.x should upgrade to version 8.2.3 or later immediately. For those unable to patch right away:
- Enable authentication on all Redis instances using the
requirepassconfiguration directive - Use ACLs to block XACKDEL by restricting the command through access control lists
- Deploy network segmentation to ensure Redis instances are not reachable from untrusted networks
- Monitor for exploitation attempts by logging XACKDEL commands with unusually large ID counts
The vulnerability demonstrates that even widely-used open source infrastructure software can harbor severe flaws. This joins a growing list of zero-day vulnerabilities affecting core infrastructure components. Redis serves as a caching layer, message broker, and session store for countless web applications. A compromise at this layer can cascade throughout dependent systems, similar to how the n8n workflow automation vulnerabilities we covered recently exposed entire business processes.
Organizations should treat any internet-exposed Redis instance without authentication as potentially compromised and audit for signs of intrusion before assuming clean remediation.
Related Articles
CISA KEV Deadline Hits Today for Unpatched Gogs Zero-Day
CVE-2025-8110 allows authenticated attackers to achieve RCE on self-hosted Git servers via path traversal. Over 700 instances already compromised.
Feb 2, 2026SolarWinds Web Help Desk Gets Emergency Patches for Four Critical Flaws
Deserialization bugs and authentication bypasses enable unauthenticated RCE. Attackers have targeted WHD vulnerabilities before.
Jan 30, 2026OpenSSL Stack Overflow Enables Remote Code Execution
CVE-2025-15467 allows attackers to crash or compromise systems by sending malicious CMS messages. All AI-discovered in OpenSSL's largest coordinated security release.
Jan 29, 2026n8n Sandbox Escape Flaws Allow Full Server Compromise
JFrog discloses CVE-2026-1470 and CVE-2026-0863 in workflow automation platform. Both vulnerabilities enable authenticated remote code execution.
Jan 29, 2026