CVE-2025-32023
HIGHCVSS v3
7
HIGH
EPSS Score
18.4%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without p
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 7/7/2025
- Last Modified
- 2/4/2026
- Exploit-DB
- EDB-52477
Frequently Asked Questions
What is CVE-2025-32023?
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without p
Is CVE-2025-32023 actively exploited?
Active exploitation of CVE-2025-32023 has not been confirmed. The EPSS score is 18.4%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2025-32023?
CVE-2025-32023 has a CVSS v3 base score of 7 (HIGH severity), with vector string 3.1.
Is CVE-2025-32023 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.