Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-34wm-4hw7-qfjv | Feast vulnerable to Deserialization of Untrusted Data |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 06 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 01 Jan 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A high-severity remote code execution vulnerability exists in feast-dev/feast version 0.53.0, specifically in the Kubernetes materializer job located at `feast/sdk/python/feast/infra/compute_engines/kubernetes/main.py`. The vulnerability arises from the use of `yaml.load(..., Loader=yaml.Loader)` to deserialize `/var/feast/feature_store.yaml` and `/var/feast/materialization_config.yaml`. This method allows for the instantiation of arbitrary Python objects, enabling an attacker with the ability to modify these YAML files to execute OS commands on the worker pod. This vulnerability can be exploited before the configuration is validated, potentially leading to cluster takeover, data poisoning, and supply-chain sabotage. | |
| Title | Arbitrary Code Execution in feast-dev/feast | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2026-01-05T19:59:19.974Z
Reserved: 2025-09-29T14:28:35.258Z
Link: CVE-2025-11157
Updated: 2026-01-05T19:59:16.007Z
Status : Awaiting Analysis
Published: 2026-01-01T07:16:00.487
Modified: 2026-01-02T16:45:26.640
Link: CVE-2025-11157
No data.
OpenCVE Enrichment
No data.
Github GHSA