Overview
- CVE-2025-49844, dubbed RediShell, is a use-after-free bug that enables arbitrary native code execution from Lua and carries a CVSS score of 10.0.
- Redis released fixes across open-source and commercial editions, urging immediate updates to the latest patched branches.
- Wiz observed about 330,000 internet-exposed Redis instances, including roughly 60,000 without authentication, heightening the risk of remote compromise.
- Germany’s BSI warned of around 4,000 unauthenticated servers in the country and cautioned that exploitation attempts are likely once details spread.
- Recommended defenses include disabling Lua via ACLs if not needed, enabling authentication, restricting network access, running as non-root, and monitoring for suspicious activity; no in-the-wild exploitation has been confirmed.