CVE-2026-41486

high

Description

Ray is an AI compute engine. From version 2.54.0 to before version 2.55.0, Ray Data registers custom Arrow extension types (ray.data.arrow_tensor, ray.data.arrow_tensor_v2, ray.data.arrow_variable_shaped_tensor) globally in PyArrow. When PyArrow reads a Parquet file containing one of these extension types, it calls __arrow_ext_deserialize__ on the field's metadata bytes. Ray's implementation passes these bytes directly to cloudpickle.loads(), achieving arbitrary code execution during schema parsing, before any row data is read. This issue has been patched in version 2.55.0.

References

https://github.com/ray-project/ray/security/advisories/GHSA-mw35-8rx3-xf9r

https://github.com/ray-project/ray/releases/tag/ray-2.55.0

https://github.com/ray-project/ray/pull/62056

https://github.com/ray-project/ray/commit/c02bd31ae31996805868baa446a131a8d304525f

Details

Source: Mitre, NVD

Published: 2026-05-08

Updated: 2026-05-18

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High

CVSS v4

Base Score: 8.9

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Severity: High

EPSS

EPSS: 0.00083