Home » Database

AVID-2026-R1654

Description

Vulnerability CVE-2025-1979

Details

Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password. This is only exploitable if: 1) Logging is enabled; 2) Redis is using password authentication; 3) Those logs are accessible to an attacker, who can reach that redis instance. Note: It is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password.

Reason for inclusion in AVID: CVE-2025-1979 describes a vulnerability in Ray (a widely used AI/ML framework) where Redis passwords may be logged in standard logging. This is a software vulnerability in a component used to build/run AI systems, with clear CVE details, affected versions, exploit conditions, and remediation guidance. It directly impacts AI pipelines and deployment stacks, representing a software supply-chain vulnerability in general-purpose AI systems.

References

Affected or Relevant Artifacts

  • Developer: n/a
  • Deployer: n/a
  • Artifact Details:
TypeName
Systemray

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
Base Score6.4
Base Severity🟠 Medium
Attack VectorLOCAL
Attack Complexity🔴 High
Privileges Required🟢 Low
User InteractionNONE
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity Impact🟢 Low
Availability ImpactNONE

CWE

IDDescription
CWE-532Insertion of Sensitive Information into Log File

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-06
  • Version: 0.3.3
  • AVID Entry