Redis 7.0

Status EOLSupport 2022-04 – 2024-07Latest 7.0.15Vulnerabilities 32← All Redis versions
Critical 10.0 Unfixed
2025-10-03≤ 7.0.15

Redis Lua Use-After-Free may lead to remote code execution

KEV
2022-02-18< 7.0.0

High 8.1
2024-01-10≥ 7.0.9 and < 7.0.15

Redis vulnerable to integer overflow in certain payloads

High 7.7 Unfixed
2026-05-05≤ 7.0.15

redis-server RESTORE invalid memory access may allow remote code execution

High 7.5 Unfixed
2025-07-07≤ 7.0.15

Redis DoS Vulnerability due to bad connection error handling

High 7.5 Unfixed
2025-04-23≤ 7.0.15

Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client

High 7.5
2023-05-18= 7.0.10

redis: contain a segmentation violation in redisraft.c

High 7.5
2022-06-22< 7.0.1

redis: memory leak via streamGetEdgeID

High 7.4
2023-07-11< 7.0.12

Heap overflow in COMMAND GETKEYS and ACL evaluation in Redis

High 7.0 Unfixed
2025-07-07≤ 7.0.15

Redis allows out of bounds writes in hyperloglog commands leading to RCE

High 7.0 Unfixed
2025-10-03≤ 7.0.15

Lua library commands may lead to integer overflow and potential RCE

High 7.0
2022-07-19< 7.0.4

Potential heap overflow in Redis

High 7.0
2022-09-23< 7.0.5

Redis subject to Integer Overflow leading to Remote Code Execution via Heap Overflow

High 7.0
2023-07-13< 7.0.12

Heap overflow issue with the Lua cjson library used by Redis

Medium 6.3 Unfixed
2025-10-03≤ 7.0.15

Redis is vulnerable to DoS via specially crafted LUA scripts

Medium 6.0 Unfixed
2025-10-03≤ 7.0.15

Redis: Authenticated users can execute LUA scripts as a different user

Medium 5.9
2023-07-15< 7.0.0

redis: an assertion failure in a primary server by sending a non-administrative command

Medium 5.5 Unfixed
2024-10-07≤ 7.0.15

Denial-of-service due to unbounded pattern matching in Redis

Medium 5.5
2023-01-20< 7.0.8

Integer overflow in multiple Redis commands can lead to denial-of-service

Medium 5.5
2023-03-02< 7.0.9

Integer Overflow in several Redis commands can lead to denial of service.

Medium 5.5
2023-03-20≥ 7.0.8 and < 7.0.10

Specially crafted MSETNX command can lead to denial-of-service

Medium 5.5
2023-04-18< 7.0.11

`HINCRBYFLOAT` can be used to crash a redis-server process

Medium 5.5
2023-01-20< 7.0.8

Integer overflow in certain command arguments can drive Redis to OOM panic

Medium 5.5
2023-03-01< 7.0.9

Redis string pattern matching can be abused to achieve Denial of Service

Medium 4.7 Unfixed
2025-05-29≤ 7.0.15

redis-check-aof may lead to stack overflow and potential RCE

Medium 4.4 Unfixed
2024-10-07≥ 7.0.0

Denial-of-service due to malformed ACL selectors in Redis

Low 3.9
2022-04-27< 7.0.0

Lua scripts can be manipulated to overcome ACL rules in Redis

Low 3.6
2023-10-18< 7.0.14

Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window.

Low 3.3
2022-04-27< 7.0.0

A Malformed Lua script can crash Redis

Low 3.3
2023-09-06< 7.0.13

Redis SORT_RO may bypass ACL configuration

Low 3.1
2022-10-21< 7.0.6

Redis Crash Report debug.c sigsegvHandler denial of service

N/A
2023-04-22< 7.0.8