Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 19 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anyscale
Anyscale ray |
|
| CPEs | cpe:2.3:a:anyscale:ray:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Anyscale
Anyscale ray |
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ray Project
Ray Project ray |
|
| Vendors & Products |
Ray Project
Ray Project ray |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 17 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability was identified in Ray Dashboard (default port 8265) in Ray versions prior to 2.8.1. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traversal sequences (e.g., ../) to access files outside the intended static directory, resulting in local file disclosure. | |
| Title | Ray Dashboard <= 2.8.0 Path Traversal Leading to Local File Disclosure | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-17T20:28:01.758Z
Reserved: 2026-03-17T11:31:56.956Z
Link: CVE-2026-32981
Updated: 2026-03-17T20:26:47.390Z
Status : Analyzed
Published: 2026-03-17T20:16:14.373
Modified: 2026-03-19T19:25:48.443
Link: CVE-2026-32981
OpenCVE Enrichment
Updated: 2026-03-24T10:54:41Z