Fix Predis — CVE-2021-30033 HIGH
Fix CVE-2021-30033 (HIGH) in Predis for PHP. Paste your composer.json into PackageFix and get a patched version — no CLI, no signup. Ssrf via crafted redis server url.
⚠ Vulnerability
CVE-2021-30033 (HIGH) — SSRF via crafted Redis server URL in Predis below ^2.2.
Vulnerable — composer.json
"predis/predis": "^1.1"
Fixed — composer.json
"predis/predis": "^2.2"
✓ Fix
Update Predis to ^2.2 and run composer install.
Paste your manifest — get back a fixed version with all CVEs patched in seconds.
Open PackageFix →No signup · No CLI · No GitHub connection · Runs 100% in your browser
CVE Details
| Field | Value |
|---|---|
| CVE ID | CVE-2021-30033 |
| Severity | HIGH |
| Package | Predis (PHP) |
| Safe version | ^2.2 |
| CISA KEV | — |
| Description | Ssrf via crafted redis server url |
Frequently Asked Questions
What is CVE-2021-30033?
CVE-2021-30033 is a HIGH severity vulnerability in Predis (PHP) that allows SSRF via crafted Redis server URL. Update to ^2.2 or later.
How do I fix CVE-2021-30033 in Predis?
Update Predis to version ^2.2 in your composer.json and run composer install.
Is CVE-2021-30033 being actively exploited?
Check packagefix.dev — the CISA KEV catalog updates daily.
How do I verify the fix for CVE-2021-30033?
After updating, paste your composer.json into PackageFix again. If CVE-2021-30033 no longer appears in the CVE table, the fix is applied.