SSB-2025-001 - Critical Remote Code Execution in Redis (“RediShell”)

CVSS score v4.0
Base 7.4

A major vulnerability (CVE-2025-49844) has been reported in Redis, a widely used in-memory data structure store, deployed on our Database-as-a-Service (DBaaS) platform.

The vulnerability allows an authenticated user to exploit a use-after-free memory corruption bug within Redis’s embedded Lua interpreter. A specially crafted Lua script can escape the Lua sandbox and execute arbitrary code on the Redis host. The vulnerability was originally evaluated with a CVSS v4.0 base score of 10.0, but Scalingo re-evaluated it to 7.4 due to required authentication and Scalingo’s security controls.

Incident analysis

Disclosed by Redis, the vulnerability (nicknamed RediShell) affects all Redis versions supporting Lua scripting since its introduction over 13 years ago.

Redis assigned it the identifier CVE-2025-49844 and published patched versions on October 3, 2025.

The following versions are affected by this vulnerability:

  • All versions prior to 6.2.20
  • Versions 7.0.0 through 7.2.10

While the issue technically enables remote code execution, exploitation requires authenticated access and the ability to execute Lua scripts. Therefore, the practical risk depends on configuration and exposure: internet-exposed or unauthenticated Redis instances are at highest risk.

Note: Redis versions 7.4+ use a different license (RSALv2 + SSPLv1) that prevents Scalingo from distributing them. Scalingo’s managed Redis service remains on the Redis 7.2 branch.

Remediation: what we did

Scalingo took the following actions after Redis’s disclosure:

  • Built and tested the patched Redis releases: 6.2.20 and 7.2.11.

  • Patched Scalingo’s internal systems that use Redis.

  • Made the patched versions available for:

    • All newly provisioned Redis databases
    • Manual upgrade by customers via the Scalingo Dashboard or CLI.
  • Scheduled automatic upgrades for all customer Redis databases over the next 3 weeks. (For all databases running v6 and v7, they’ll be updated in less than a week):

    • Redis 4 to Redis 5 (latest)
    • Redis 5 to Redis 6 (latest)
    • Redis 6 to Redis 6 (latest)
    • Redis 7 to Redis 7 (latest)

Impact

Redis databases on Scalingo are:

  • Always executed in isolated Linux containers;

  • Protected by strong, randomly generated passwords;
  • Not exposed to the internet unless explicitly configured by the user.

Because the exploit requires authenticated access, the likelihood of exploitation on Scalingo is very low.

Even in a hypothetical successful attack, the impact would be limited to the Redis container scope—there is no path to escape the container or access other customer data.

What you should do

No immediate action required for customers using managed Redis add-ons. Automatic upgrades to patched versions are scheduled over the next 3 weeks to ensure all instances are protected.

Ensure that internet access for your Redis instances is only enabled if absolutely necessary. This feature is disabled by default and can be controlled via the Scalingo Dashboard or CLI.

What we will do in the future

Scalingo will:

  • Continue monitoring Redis security advisories and applying security updates promptly.

  • Continue to strengthen automated vulnerability monitoring to increase detection capabilities.

Product Impacts

Scalingo PaaS

No impact on the application platform layer.

Scalingo DBaaS Add-ons

All Redis add-ons are being upgraded to patched versions (6.2.20 for Redis 6.x and 7.2.11 for Redis 7.x) over the next 3 weeks. No other managed database services (PostgreSQL, MySQL, MongoDB, Elasticsearch, OpenSearch, InfluxDB) are affected.

Other Scalingo Add-ons and Services

No other add-ons or services are impacted.

Contact

If you have any questions or require further assistance, please contact our support team. We remain committed to ensuring the security of our platform and the protection of our users’ data.

Timeline

2025-05-16 Vulnerability reported by Wiz Research during Pwn2Own Berlin
2025-10-03 Redis publishes its official security advisory and patches
2025-10-07 Scalingo builds and tests patched Redis 6.2.20 and 7.2.11
2025-10-07 Patched versions made available for new instances and manual upgrades
2025-10-08 Public disclosure of Scalingo Security Bulletin SSB-2025-001

Changelog

2025-10-08: Initial publication of SSB-2025-001


Suggest edits

SSB-2025-001 - Critical Remote Code Execution in Redis (“RediShell”)

©2025 Scalingo