CVE-2025-46686

Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol is not a violation of the Redis Security Model.
Configurations

No configuration.

History

25 Jul 2025, 04:16

Type Values Removed Values Added
References
  • () https://github.com/redis/redis/security/advisories/GHSA-2r7g-8hpc-rpq9 -
CVSS v2 : unknown
v3 : 4.9
v2 : unknown
v3 : 3.5
CWE CWE-401
Summary (en) Redis through 7.4.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. (en) Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol is not a violation of the Redis Security Model.

23 Jul 2025, 20:15

Type Values Removed Values Added
CWE CWE-789
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9

23 Jul 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-23 19:15

Updated : 2025-07-25 15:29


NVD link : CVE-2025-46686

Mitre link : CVE-2025-46686

CVE.ORG link : CVE-2025-46686


JSON object : View

Products Affected

No product.

CWE
CWE-401

Missing Release of Memory after Effective Lifetime

CWE-789

Memory Allocation with Excessive Size Value