The RediShell CVE-2025-49844 has put Redis’ in‑memory store on notice, turning a critical RCE into a real deployment debate. Some coverage even framed it as a “13-year-old bug,” a reminder that old weaknesses can sting when they meet real-world access [3][1].
CVE at a glance – CVE-2025-49844 is a use-after-free in the Lua engine that can lead to remote code execution once an attacker authenticates. Notably, Upstash isn’t affected because it isn’t upstream Redis, and forks are racing to patch as fast as they can [4][5].
POC and community chatter – A PoC exists on GitHub, and early chatter centers on how to limit exposure and what constitutes a real attack surface in typical deployments [2]. Forks like Valkey have started surfacing patches quickly, with an 8.1.4 release fielded after a fix commit [5].
Mitigations you can apply now - ACLs to disable Lua scripts (restricting EVAL and EVALSHA) can blunt the vulnerability without patching the server itself [4]. - Upgrade to patched builds when available; forks such as Valkey are shipping fixes (e.g., 8.1.4) to close the gap [5]. - Require authentication and avoid exposing Redis instances publicly to reduce risk, since exploitation hinges on authenticated access [4].
Deployment implications and patch cadence – The mix of upstream Redis, forks, and proprietary variants shapes patch cadence and risk management. In practice, teams lean on patched builds and targeted mitigations (Lua restrictions) to buy time while tracking forked releases [4][5].
Closing thought: treat Redis‑like stores as security-sensitive — patch fast, and don’t overlook Lua‑level mitigations.
POST IDs referenced: [1, 2, 3, 4, 5]
References
CVE-2025-49844: "RediShell" Critical Remote Code Execution in Redis
CVE-2025-49844 'RediShell' enables remote code execution in Redis; discussion links Sysdig blog and HN thread
View sourceExploit POC: RediShell Vulnerability in Redis
Discusses Redis RediShell exploit PoC and security implications for Redis deployments.
View source13-year-old level-10 bug in Redis could allow RCE
Redis vulnerability could allow remote code execution; article notes long-running issue and calls for patching
View sourceRedis CVE-2025-49844: Use-After-Free may lead to remote code execution
Discusses Redis CVE-2025-49844, authenticated exploitation, mitigations with ACLs to disable Lua, Upstash implications, and safety debates
View sourceRediShell: Critical remote code execution vulnerability in Redis
Discusses Redis RCE via Lua sandbox escape, exposure risks, auth defaults, forks fixes, and CVSS debates in security community today.
View source