{"id":"CLEANSTART-2026-YM75307","summary":"Redis is an open source, in-memory database that persists on disk","details":"Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.","modified":"2026-02-20T17:15:32.399816Z","published":"2026-01-30T14:34:22.430652Z","upstream":["CVE-2015-8080","CVE-2019-10192","CVE-2019-10193","CVE-2020-14147","CVE-2021-32625","CVE-2021-32626","CVE-2021-32627","CVE-2021-32628","CVE-2021-32672","CVE-2021-32675","CVE-2021-32687","CVE-2021-32762","CVE-2021-41099","CVE-2022-24736","CVE-2022-24834","CVE-2022-35977","CVE-2022-3647","CVE-2023-36824","CVE-2023-41053","CVE-2023-41056","CVE-2023-45145","CVE-2024-31227","CVE-2024-31228","CVE-2024-31449","CVE-2025-46817","CVE-2025-46818","CVE-2025-46819","CVE-2025-49844"],"database_specific":{},"references":[{"type":"ADVISORY","url":"https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-YM75307.json"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2015-8080"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2019-10192"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2019-10193"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2020-14147"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2021-32625"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2021-32626"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2021-32627"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2021-32628"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2021-32672"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2021-32675"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2021-32687"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2021-32762"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2021-41099"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2022-24736"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2022-24834"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2022-35977"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2022-3647"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2023-36824"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2023-41053"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2023-41056"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2023-45145"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2024-31227"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2024-31228"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2024-31449"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-46817"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-46818"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-46819"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-49844"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8080"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10192"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10193"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14147"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32625"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32626"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32627"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32628"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32672"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32675"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32687"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32762"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41099"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24736"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24834"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-35977"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3647"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36824"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41053"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41056"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45145"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31227"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31228"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31449"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-46817"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-46818"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-46819"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-49844"}],"affected":[{"package":{"name":"redis","ecosystem":"CleanStart"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.4.6-r0"}]}],"database_specific":{"source":"https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-YM75307.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}