/ data / vuln_en / feast / CVE-2025-11157.yaml
CVE-2025-11157.yaml
 1  info:
 2    name: feast
 3    cve: CVE-2025-11157
 4    summary: Feast is vulnerable to Deserialization of Untrusted Data, leading to remote code execution.
 5    details: |
 6      A high-severity remote code execution vulnerability exists in feast-dev/feast version 0.53.0,
 7      specifically in the Kubernetes materializer job located at `feast/sdk/python/feast/infra/compute_engines/kubernetes/main.py`.
 8      The vulnerability arises from the use of `yaml.load(..., Loader=yaml.Loader)` to deserialize
 9      `/var/feast/feature_store.yaml` and `/var/feast/materialization_config.yaml`. This method allows for the
10      instantiation of arbitrary Python objects, enabling an attacker with the ability to modify these YAML files
11      to execute OS commands on the worker pod. This vulnerability can be exploited before the configuration is
12      validated, potentially leading to cluster takeover, data poisoning, and supply-chain sabotage.
13    cvss: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
14    severity: HIGH
15    security_advise: |
16      1. Upgrade Feast to version 0.54.0 or later.
17      2. Ensure that YAML configuration files (`/var/feast/feature_store.yaml` and `/var/feast/materialization_config.yaml`)
18         are not modifiable by untrusted users.
19      3. Implement strict access controls and validation for any configuration files processed by Feast.
20  rule: version > "0" && version < "0.54.0"
21  references:
22    - https://nvd.nist.gov/vuln/detail/CVE-2025-11157
23    - https://github.com/feast-dev/feast/pull/5643
24    - https://github.com/feast-dev/feast/commit/b2e37ff37953b68ae833f6874ab5bc510a4ca5fb
25    - https://github.com/feast-dev/feast
26    - https://huntr.com/bounties/46d4d585-b968-4a76-80ce-872bc5525564