Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 06 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 06 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redis
Redis redis |
|
| Vendors & Products |
Redis
Redis redis |
Tue, 05 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Redis is an in-memory data structure store. In all versions of redis-server with Lua scripting, an authenticated attacker can exploit the master-replica synchronization mechanism to trigger a use-after-free on replicas where replica-read-only is disabled or can be disabled, which may lead to remote code execution. A workaround is to prevent users from executing Lua scripts or avoid using replicas where replica-read-only is disabled. This is patched in version 8.6.3. | |
| Title | redis-server Lua use-after-free may allow remote code execution | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-06T13:23:48.308Z
Reserved: 2026-01-14T16:08:37.482Z
Link: CVE-2026-23631
Updated: 2026-05-06T13:23:44.836Z
Status : Analyzed
Published: 2026-05-05T17:17:03.503
Modified: 2026-05-06T16:14:21.243
Link: CVE-2026-23631
No data.
OpenCVE Enrichment
Updated: 2026-05-05T18:30:29Z