Particle.news

Download on the App Store

Redis Patches Critical 13-Year Lua Flaw That Enables Remote Code Execution

Researchers urge immediate upgrades following scans revealing hundreds of thousands of internet-exposed instances.

Overview

  • Tracked as CVE-2025-49844 with a CVSS score of 10.0, the bug is a use-after-free in RedisLua engine that lets a crafted script escape the sandbox and run code on the host.
  • Redis released fixes across OSS/CE/Stack/Software editions, and maintainers advise prioritizing upgrades for deployments reachable from the internet.
  • Wiz measured roughly 330,000 Redis servers exposed online, including about 60,000 without authentication enabled.
  • Redis Cloud has already been upgraded, and CISO Riaz Lakhani says there is no evidence of exploitation in managed service or reported customer environments.
  • Mitigations urged by Redis and Wiz include enforcing authentication, restricting network access, disabling Lua scripting if not needed, running as non‑root, and monitoring for Lua-related crashes and unknown scripts.