CVE-2026-23479
High
Published: 05 May 2026
Published
05 May 2026
Modified
06 May 2026
KEV Added
—
Patch
—
CVSS Score
8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score
0.0010
27.8th percentile
Risk Priority
18
60% EPSS · 20% KEV · 20% CVSS
Description
Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an…
more
authenticated attacker can trigger a use-after-free that may lead to remote code execution. This has been patched in version 8.6.3.
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
addresses: CWE-416
Use-after-free exploits that achieve arbitrary code execution are blocked or significantly hardened by non-executable pages and ASLR.
Security SummaryAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)
Affected Products
redis
redis
7.2.0 — 8.6.3