-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ray | pip | < 2.43.0 | 2.43.0 |
The vulnerability stems from the logging statement in the main() function of server.py. The commit diff shows the vulnerable line was directly logging the 'args' object, which included redis_password. The patch explicitly redacts redis_password by replacing it with '****' before logging. The GitHub issue (#50266) and CVE description both confirm this line as the exposure point. The function's direct interaction with argument logging and credential handling makes this identification unambiguous.
Ongoing coverage of React2Shell