Redis 7.2

Status Security onlySupport 2023-08 – —Latest 7.2.14Vulnerabilities 19← All Redis versions
Critical 10.0
2025-10-03< 7.2.11

Redis Lua Use-After-Free may lead to remote code execution

High 8.1
2024-01-10< 7.2.4

Redis vulnerable to integer overflow in certain payloads

High 7.7
2026-05-05< 7.2.14

redis-server RESTORE invalid memory access may allow remote code execution

High 7.7
2026-05-05< 7.2.14

redis-server use-after-free in unblock client flow may allow remote code execution

High 7.5
2025-07-07< 7.2.10

Redis DoS Vulnerability due to bad connection error handling

High 7.5 Unfixed
2025-04-23≤ 7.2.5

Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client

High 7.0
2025-07-07< 7.2.10

Redis allows out of bounds writes in hyperloglog commands leading to RCE

High 7.0
2025-10-03< 7.2.11

Lua library commands may lead to integer overflow and potential RCE

High 7.0
2025-01-06< 7.2.5

Redis' Lua library commands may lead to remote code execution

High 7.0
2024-10-07< 7.2.6

Lua library commands may lead to stack overflow and RCE in Redis

Medium 6.3
2025-10-03< 7.2.11

Redis is vulnerable to DoS via specially crafted LUA scripts

Medium 6.1
2026-05-05< 7.2.14

redis-server Lua use-after-free may allow remote code execution

Medium 6.0
2025-10-03< 7.2.11

Redis: Authenticated users can execute LUA scripts as a different user

Medium 5.5
2024-10-07< 7.2.6

Denial-of-service due to unbounded pattern matching in Redis

Medium 4.7 Unfixed
2025-05-29≤ 7.2.13

redis-check-aof may lead to stack overflow and potential RCE

Medium 4.4
2024-10-07< 7.2.6

Denial-of-service due to malformed ACL selectors in Redis

Medium 4.4
2025-01-06< 7.2.7

Redis allows denial-of-service due to malformed ACL selectors

Low 3.6
2023-10-18< 7.2.2

Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window.

Low 3.3
2023-09-06< 7.2.1

Redis SORT_RO may bypass ACL configuration