Fix Predis — CVE-2021-30033 HIGH

Fix CVE-2021-30033 (HIGH) in Predis for PHP. Paste your composer.json into PackageFix and get a patched version — no CLI, no signup. Ssrf via crafted redis server url.

⚠ Vulnerability

CVE-2021-30033 (HIGH) — SSRF via crafted Redis server URL in Predis below ^2.2.

Vulnerable — composer.json

"predis/predis": "^1.1"

Fixed — composer.json

"predis/predis": "^2.2"
✓ Fix

Update Predis to ^2.2 and run composer install.

Paste your manifest — get back a fixed version with all CVEs patched in seconds.

Open PackageFix →

No signup · No CLI · No GitHub connection · Runs 100% in your browser

CVE Details

FieldValue
CVE IDCVE-2021-30033
SeverityHIGH
PackagePredis (PHP)
Safe version^2.2
CISA KEV
DescriptionSsrf via crafted redis server url

Frequently Asked Questions

What is CVE-2021-30033?
CVE-2021-30033 is a HIGH severity vulnerability in Predis (PHP) that allows SSRF via crafted Redis server URL. Update to ^2.2 or later.
How do I fix CVE-2021-30033 in Predis?
Update Predis to version ^2.2 in your composer.json and run composer install.
Is CVE-2021-30033 being actively exploited?
Check packagefix.dev — the CISA KEV catalog updates daily.
How do I verify the fix for CVE-2021-30033?
After updating, paste your composer.json into PackageFix again. If CVE-2021-30033 no longer appears in the CVE table, the fix is applied.

Related Guides