CVE-2025-27151

Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
4.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 17%
VendorProductVersion
redisredis
7.0.0 ≤
𝑥
< 8.0.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
redict
forky
7.3.5+ds-1
fixed
sid
7.3.5+ds-1
fixed
bullseye
not-affected
redis
bullseye
5:6.0.16-1+deb11u2
not-affected
bullseye (security)
5:6.0.16-1+deb11u7
fixed
bookworm
vulnerable
bookworm (security)
5:7.0.15-1~deb12u5
fixed
forky
5:8.0.2-3
fixed
sid
5:8.0.2-3
fixed
trixie
5:8.0.2-3
fixed
valkey
forky
8.1.1+dfsg1-3
fixed
sid
8.1.1+dfsg1-3
fixed
trixie
8.1.1+dfsg1-3
fixed
bullseye
not-affected