CVE-2026-23479 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: May 6, 2026
Redis - Use After Free
Published: May 5, 2026Updated: May 6, 2026Remote Exploitable
Overview
Redis redis-server 7.2.0 to 8.6.3 contains a use-after-free caused by improper error handling in unblock client flow during blocked command re-execution, letting authenticated attackers achieve remote code execution.
Severity & Score
Severity: High
CVSS Score: 8.8
Impact
Authenticated attackers can exploit use-after-free to execute arbitrary code remotely, potentially compromising the server.
Mitigation
Upgrade to version 8.6.3 or later.
References
Related Resources
Details
- CVE ID
- CVE-2026-23479
- Severity
- High
- CVSS Score
- 8.8
- Type
- use_after_free
- Status
- confirmed
CWE
- CWE-416
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H