CVE-2026-27482

Ray is an AI compute engine. In versions 2.53.0 and below, thedashboard HTTP server blocks browser-origin POST/PUT but does not cover DELETE, and key DELETE endpoints are unauthenticated by default. If the dashboard/agent is reachable (e.g., --dashboard-host=0.0.0.0), a web page via DNS rebinding or same-network access can issue DELETE requests that shut down Serve or delete jobs without user interaction. This is a drive-by availability impact. The fix for this vulnerability is to update to Ray 2.54.0 or higher.
Configurations

Configuration 1 (hide)

cpe:2.3:a:anyscale:ray:*:*:*:*:*:*:*:*

History

04 Mar 2026, 18:59

Type Values Removed Values Added
Summary
  • (es) Ray es un motor de cómputo de IA. En las versiones 2.53.0 e inferiores, el servidor HTTP del panel de control bloquea POST/PUT de origen de navegador pero no cubre DELETE, y los endpoints DELETE clave no están autenticados por defecto. Si el panel de control/agente es accesible (p. ej., --dashboard-host=0.0.0.0), una página web a través de la reconfiguración de DNS o el acceso a la misma red puede emitir solicitudes DELETE que apagan Serve o eliminan trabajos sin interacción del usuario. Esto supone un impacto en la disponibilidad de tipo drive-by. La solución para esta vulnerabilidad es actualizar a Ray 2.54.0 o superior.
References () https://github.com/ray-project/ray/security/advisories/GHSA-q5fh-2hc8-f6rq - Vendor Advisory, Exploit () https://github.com/ray-project/ray/security/advisories/GHSA-q5fh-2hc8-f6rq - Exploit, Vendor Advisory

24 Feb 2026, 16:54

Type Values Removed Values Added
First Time Anyscale
Anyscale ray
CPE cpe:2.3:a:anyscale:ray:*:*:*:*:*:*:*:*
References () https://github.com/ray-project/ray/commit/0fda8b824cdc9dc6edd763bb28dfd7d1cc9b02a4 - () https://github.com/ray-project/ray/commit/0fda8b824cdc9dc6edd763bb28dfd7d1cc9b02a4 - Patch
References () https://github.com/ray-project/ray/pull/60526 - () https://github.com/ray-project/ray/pull/60526 - Issue Tracking, Patch
References () https://github.com/ray-project/ray/releases/tag/ray-2.54.0 - () https://github.com/ray-project/ray/releases/tag/ray-2.54.0 - Product, Release Notes
References () https://github.com/ray-project/ray/security/advisories/GHSA-q5fh-2hc8-f6rq - () https://github.com/ray-project/ray/security/advisories/GHSA-q5fh-2hc8-f6rq - Vendor Advisory, Exploit

21 Feb 2026, 10:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-21 10:16

Updated : 2026-03-04 18:59


NVD link : CVE-2026-27482

Mitre link : CVE-2026-27482

CVE.ORG link : CVE-2026-27482


JSON object : View

Products Affected

anyscale

  • ray
CWE
CWE-396

Declaration of Catch for Generic Exception