Newsroom

EasyApache4 v25.23 Maintenance and Security Release

Webpros has released an update for EasyApache 4!  Take a look at some highlights below, and then join us on the cPanel Community Forums, Discord, or Reddit to talk about this update and much more. If you have additional questions, feel free to reach out on one of our social channels.

  • ea-redis62
    • EA-13003: Update ea-redis62 from v6.2.18 to v6.2.19
    • (CVE-2025-32023) Fix out-of-bounds write in HyperLogLog commands
    • (CVE-2025-48367) Retry accepting other connections even if the accepted connection reports an error
  • ea-tomcat101
    • EA-13004: Update ea-tomcat101 from v10.1.42 to v10.1.43
  • ea-valkey72
    • EA-13013: Update ea-valkey72 from v7.2.9 to v7.2.10
  • ea-nginx-njs
    • EA-13015: Update ea-nginx-njs from v0.9.0 to v0.9.1
  • ea-nginx
    • ZC-12940: fix warnings from /etc/nginx/ea-nginx/meta/apache

SUMMARY

WebPros International, LLC has updated packages for EasyApache 4 with an updated version of Redis. This release addresses vulnerabilities related to CVE-2025-32023 and CVE-2025-48367. We strongly encourage all Redis users to update to version 6.2.19.

AFFECTED VERSIONS
All versions of Redis through 6.2.18.

SECURITY RATING
The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:

CVE-2025-32023 – HIGH
Redis 6.2.19
Fixed vulnerability related to CVE-2025-32023.

CVE-2025-48367 – HIGH
Redis 6.2.19
Fixed vulnerability related to CVE-2025-48367.

SOLUTION
WebPros International, LLC has released an updated package for EasyApache 4 25.23 on 2025 July 16, with Redis version 6.2.19. Unless you have enabled automatic package updates in your cron, update your system with either your package manager or WHM’s Run System Update interface.

REFERENCES
https://www.cve.org/CVERecord?id=CVE-2025-32023
https://www.cve.org/CVERecord?id=CVE-2025-48367
https://github.com/redis/redis/releases/tag/6.2.19

Information about all releases this year can be found in the 2025 EasyApache 4 Changelog.

You can follow our RSS feed for all our releases here: https://docs.cpanel.net/release-notes/release-notes/index.xml

GPG signed copy of this announcement: https://news.cpanel.com/wp-content/uploads/2025/07/EA4-25.23-CVE.signed.txt