CVE-2025-11157.yaml
1 info: 2 name: feast 3 cve: CVE-2025-11157 4 summary: Feast is vulnerable to Deserialization of Untrusted Data, leading to remote code execution. 5 details: | 6 A high-severity remote code execution vulnerability exists in feast-dev/feast version 0.53.0, 7 specifically in the Kubernetes materializer job located at `feast/sdk/python/feast/infra/compute_engines/kubernetes/main.py`. 8 The vulnerability arises from the use of `yaml.load(..., Loader=yaml.Loader)` to deserialize 9 `/var/feast/feature_store.yaml` and `/var/feast/materialization_config.yaml`. This method allows for the 10 instantiation of arbitrary Python objects, enabling an attacker with the ability to modify these YAML files 11 to execute OS commands on the worker pod. This vulnerability can be exploited before the configuration is 12 validated, potentially leading to cluster takeover, data poisoning, and supply-chain sabotage. 13 cvss: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 14 severity: HIGH 15 security_advise: | 16 1. Upgrade Feast to version 0.54.0 or later. 17 2. Ensure that YAML configuration files (`/var/feast/feature_store.yaml` and `/var/feast/materialization_config.yaml`) 18 are not modifiable by untrusted users. 19 3. Implement strict access controls and validation for any configuration files processed by Feast. 20 rule: version > "0" && version < "0.54.0" 21 references: 22 - https://nvd.nist.gov/vuln/detail/CVE-2025-11157 23 - https://github.com/feast-dev/feast/pull/5643 24 - https://github.com/feast-dev/feast/commit/b2e37ff37953b68ae833f6874ab5bc510a4ca5fb 25 - https://github.com/feast-dev/feast 26 - https://huntr.com/bounties/46d4d585-b968-4a76-80ce-872bc5525564