CVE-2025-32023

HIGH

CVSS v3

7

HIGH

EPSS Score

18.4%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without p

Technical Details

CVSS v3 Vector
3.1
Published
7/7/2025
Last Modified
2/4/2026
Exploit-DB
EDB-52477

Frequently Asked Questions

What is CVE-2025-32023?

Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without p

Is CVE-2025-32023 actively exploited?

Active exploitation of CVE-2025-32023 has not been confirmed. The EPSS score is 18.4%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-32023?

CVE-2025-32023 has a CVSS v3 base score of 7 (HIGH severity), with vector string 3.1.

Is CVE-2025-32023 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.