A critical vulnerability, CVE-2025-49844 (dubbed “RediShell”), exists in Redis’s Lua scripting subsystem. The flaw is a use‑after‑free vulnerability in the embedded Lua interpreter that can allow an attacker who can execute Lua scripts (for example, via EVAL or modules) to escape the Lua sandbox and achieve arbitrary code execution on the underlying host. The issue traces back to code added in 2012 and affects Redis releases that include Lua scripting support; Redis published patches (6.2.20, 7.2.11, 7.4.6, 8.0.4 and 8.2.2) on October 3, 2025. The vulnerability is rated critical (CVSS 9.9) because successful exploitation can lead to full system compromise and persistence on affected hosts.
The IONIX research team is tracking ongoing exploitation attempts and recommends immediate patching. Potentially affected assets are outlined in this post.
References:

