Redis Reveals 13-Year-Old Bug: RediShell RCE Vulnerability Uncovered!
Redis has finally patched a 13-year-old Lua flaw, CVE-2025-49844, that lets hackers perform remote code execution. This bug, dubbed “RediShell,” has a CVSS score of 10.0, so it’s as serious as forgetting your wedding anniversary. Redis users, update your systems faster than a teenager texts.

Hot Take:
Who knew that Redis had been harboring a 13-year-old Lua stowaway ready to wreak havoc with a CVSS score of a perfect 10? Talk about a blast from the past! It’s like finding out your old Tamagotchi was secretly a supervillain. Time to patch up those Redis instances before they start plotting world domination!
Key Points:
- The Redis vulnerability, CVE-2025-49844, allows remote code execution via a use-after-free bug in Lua scripting.
- Exploitation requires authenticated access, emphasizing the need for strong authentication and restricted internet exposure.
- Redis versions released on October 3, 2025, have addressed this flaw; organizations should prioritize updating their systems.
- The vulnerability impacts all Redis versions with Lua scripting, posing a significant threat due to widespread use in cloud environments.
- Potential consequences include data exfiltration, credential theft, malware deployment, and lateral movement within networks.
Already a member? Log in here