Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-49844 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Redis versions ≀ 8.2.1 suffer from a **Use-After-Free (UAF)** bug in the Lua parser. 🧠 **Mechanism**: A crafted Lua script triggers a race condition with the Garbage Collector (GC).…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-416 (Use-After-Free). πŸ” **Root Cause**: The `luaY_parser` function fails to **anchor the chunk name string** on the Lua stack before invoking the lexer.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: Redis (Open Source). πŸ“‰ **Affected Versions**: **Redis 8.2.1 and earlier**. βœ… **Fixed Version**: Redis 8.2.2+.…

Q4What can hackers do? (Privileges/Data)

πŸ’» **Privileges**: Hackers gain **Remote Code Execution (RCE)**. πŸ”“ **Impact**: Full control over the Redis server process. πŸ“‚ **Data**: Can read/write any data accessible to the Redis instance.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Auth Required**: **Yes**. The CVSS vector `PR:L` indicates **Privileges Required: Low**. 🌐 **Access**: Attacker needs network access and valid credentials to run Lua scripts.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Public Exploits**: **YES**. Multiple PoCs exist: - `dwisiswant0/CVE-2025-49844` (Lua Parser UAF) - `raminfp/redis_exploit` (RediShell) - `srozb/reditrap` (Honeypot detection).…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: - Check Redis version (`INFO SERVER`). - Use `dwisiswant0/CVE-2025-49844` scripts to test for UAF.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Official Fix**: **YES**. Patched in **Redis 8.2.2**. πŸ”— **Commit**: `d5728cb` fixes the issue by pushing the chunk name to the stack before parsing. πŸ“’ **Advisory**: GHSA-4789-qfc9-5f9q confirms the fix.…

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: - **Disable Lua scripting** if not needed (`lua-time-limit` or config changes). - **Restrict Network Access**: Block external access to Redis ports (6379).…

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **CRITICAL / IMMEDIATE**. 🚨 **Priority**: P0. - CVSS 10.0 score. - Active PoCs in the wild. - RCE impact. - Easy to exploit with low privileges. πŸ“… **Timeline**: Published Oct 3, 2025. Fix available.…