Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q279-jhrf-cc6v | Ray is vulnerable to Critical RCE via Safari & Firefox Browsers through DNS Rebinding Attack |
Mon, 01 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 28 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ray Project
Ray Project ray |
|
| Vendors & Products |
Ray Project
Ray Project ray |
Wed, 26 Nov 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ray as a development tool can be exploited via a critical RCE vulnerability exploitable via Firefox and Safari. This vulnerability is due to an insufficient guard against browser-based attacks, as the current defense uses the User-Agent header starting with the string "Mozilla" as a defense mechanism. This defense is insufficient as the fetch specification allows the User-Agent header to be modified. Combined with a DNS rebinding attack against the browser, and this vulnerability is exploitable against a developer running Ray who inadvertently visits a malicious website, or is served a malicious advertisement (malvertising). This issue has been patched in version 2.52.0. | |
| Title | Ray is vulnerable to RCE via Safari & Firefox Browsers through DNS Rebinding Attack | |
| Weaknesses | CWE-352 CWE-94 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-28T18:22:23.915Z
Reserved: 2025-10-16T19:24:37.266Z
Link: CVE-2025-62593
Updated: 2025-11-28T18:22:05.838Z
Status : Deferred
Published: 2025-11-26T23:15:47.927
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-62593
OpenCVE Enrichment
Updated: 2025-11-27T16:26:29Z
Github GHSA