CVE-2025-62593

Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ray as a development tool can be exploited via a critical RCE vulnerability exploitable via Firefox and Safari. This vulnerability is due to an insufficient guard against browser-based attacks, as the current defense uses the User-Agent header starting with the string "Mozilla" as a defense mechanism. This defense is insufficient as the fetch specification allows the User-Agent header to be modified. Combined with a DNS rebinding attack against the browser, and this vulnerability is exploitable against a developer running Ray who inadvertently visits a malicious website, or is served a malicious advertisement (malvertising). This issue has been patched in version 2.52.0.
CVSS

No CVSS.

Configurations

No configuration.

History

26 Nov 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-26 23:15

Updated : 2025-12-01 15:39


NVD link : CVE-2025-62593

Mitre link : CVE-2025-62593

CVE.ORG link : CVE-2025-62593


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-352

Cross-Site Request Forgery (CSRF)