Vulnerability Description
Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an authenticated attacker can trigger a use-after-free that may lead to remote code execution. This has been patched in version 8.6.3.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redis | Redis | >= 7.2.0, < 8.6.3 |
Related Weaknesses (CWE)
References
- https://github.com/redis/redis/releases/tag/8.6.3Release Notes
- https://github.com/redis/redis/security/advisories/GHSA-93m2-935m-8rj3Vendor Advisory
FAQ
What is CVE-2026-23479?
CVE-2026-23479 is a vulnerability with a CVSS score of 8.8 (HIGH). Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a bloc...
How severe is CVE-2026-23479?
CVE-2026-23479 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23479?
Check the references section above for vendor advisories and patch information. Affected products include: Redis Redis.