Description
Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ray as a development tool can be exploited via a critical RCE vulnerability exploitable via Firefox and Safari. This vulnerability is due to an insufficient guard against browser-based attacks, as the current defense uses the User-Agent header starting with the string "Mozilla" as a defense mechanism. This defense is insufficient as the fetch specification allows the User-Agent header to be modified. Combined with a DNS rebinding attack against the browser, and this vulnerability is exploitable against a developer running Ray who inadvertently visits a malicious website, or is served a malicious advertisement (malvertising). This issue has been patched in version 2.52.0.
INFO
Published Date :
2025-11-26T22:28:28.577Z
Last Modified :
2025-11-28T18:22:23.915Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-62593 vulnerability.
| Vendors | Products |
|---|---|
| Ray Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-62593.