CVE-2025-49844 is an authenticated remote code execution vulnerability in the Lua scripting engine of Redis, the open-source in-memory data store widely used around the world to store ephemeral data and manage caching & user sessions.
The flaw allows an authenticated user to execute arbitrary code through a specially crafted Lua script that manipulates the garbage collector. Redis disclosed the issue on October 3, 2025, as part of an ongoing effort by the Redis community to maintain security and compliance.
Redis assigned the issue a CVSS 3.1 base score of 10.0 (Critical). While exploitation requires valid credentials, authentication is not required by default, so many Redis instances are configured without needing to login. Organizations who use Redis both externally and internally without authentication configured are at significant risk of exploitation, though no active exploitation has been observed.
The Redis Rapid Response test, released October 9, 2025, enables customers to safely check if they are at risk.
Note: In order to maintain production safety, this Rapid Response test does not attempt to exploit the issue. It instead relies on the service’s self-reported version number.
| Indicator | Type | Description |
| Unauthorized access to Redis | Behavior | Connections from unknown IPs or users not normally accessing Redis |
| Unknown or anomalous Lua scripts | Behavior | Presence of unexpected or suspicious Lua code in the Redis database |
| Redis server crash logs | Behavior | Crashes or stack traces originating from the Lua engine |
| Unexpected command execution | Behavior | Unusual process activity or command execution by the redis-server user |
| Unusual network traffic | Behavior | Ingress or egress traffic anomalies from Redis hosts |
| File system changes | Behavior | Unexpected modifications to directories containing Redis configuration or persistent data |
🔗 Redis GitHub Security Advisories page
🔗 OpenCVE
The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.