CVE-2025-27151
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
29/05/2025
Last modified:
23/12/2025
Description
Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* | 7.0.0 (including) | 7.2.9 (excluding) |
| cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* | 7.4.0 (including) | 7.4.4 (excluding) |
| cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* | 8.0.0 (including) | 8.0.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



