{"id":"CVE-2026-23631","summary":"redis-server Lua use-after-free may allow remote code execution","details":"Redis is an in-memory data structure store. In all versions of redis-server with Lua scripting, an authenticated attacker can exploit the master-replica synchronization mechanism to trigger a use-after-free on replicas where replica-read-only is disabled or can be disabled, which may lead to remote code execution. A workaround is to prevent users from executing Lua scripts or avoid using replicas where replica-read-only is disabled. This is patched in version 8.6.3.","aliases":["BIT-keydb-2026-23631","BIT-redis-2026-23631","BIT-valkey-2026-23631","GHSA-8ghh-qpmp-7826"],"modified":"2026-05-10T12:18:39.185257Z","published":"2026-05-05T16:39:32.337Z","related":["openSUSE-SU-2026:10711-1","openSUSE-SU-2026:10719-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23631.json","cwe_ids":["CWE-416"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/redis/redis/releases/tag/8.6.3"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23631.json"},{"type":"ADVISORY","url":"https://github.com/redis/redis/security/advisories/GHSA-8ghh-qpmp-7826"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23631"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/redis/redis","events":[{"introduced":"0"},{"fixed":"bd3b38d41070b478c58bc8b72d2af89cbccd1a40"}],"database_specific":{"cpe":"cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"8.6.3"}],"source":["CPE_FIELD","REFERENCES"]}}],"versions":["1.3.6","2.2-alpha0","2.2-alpha1","2.2-alpha2","2.2-alpha3","2.2-alpha4","2.2-alpha5","2.2-alpha6","2.2.0-rc1","2.3-alpha0","8.4-int","8.6-rc1","8.6.0","8.6.1","8.6.2","v1.3.10","v1.3.11","v1.3.7","v1.3.8","v1.3.9","v2.0.0-rc1","v2.1.1-watch","vm-playpen"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23631.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N"}]}