Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11157: CWE-502 Deserialization of Untrusted Data in feast-dev feast-dev/feast

0
High
VulnerabilityCVE-2025-11157cvecve-2025-11157cwe-502
Published: Thu Jan 01 2026 (01/01/2026, 07:03:57 UTC)
Source: CVE Database V5
Vendor/Project: feast-dev
Product: feast-dev/feast

Description

A high-severity remote code execution vulnerability exists in feast-dev/feast version 0.53.0, specifically in the Kubernetes materializer job located at `feast/sdk/python/feast/infra/compute_engines/kubernetes/main.py`. The vulnerability arises from the use of `yaml.load(..., Loader=yaml.Loader)` to deserialize `/var/feast/feature_store.yaml` and `/var/feast/materialization_config.yaml`. This method allows for the instantiation of arbitrary Python objects, enabling an attacker with the ability to modify these YAML files to execute OS commands on the worker pod. This vulnerability can be exploited before the configuration is validated, potentially leading to cluster takeover, data poisoning, and supply-chain sabotage.

AI-Powered Analysis

AILast updated: 01/01/2026, 22:28:49 UTC

Technical Analysis

CVE-2025-11157 is a critical vulnerability identified in feast-dev/feast version 0.53.0, specifically within the Kubernetes materializer job component located at feast/sdk/python/feast/infra/compute_engines/kubernetes/main.py. The root cause is the unsafe use of the PyYAML library's yaml.load function with the yaml.Loader, which permits deserialization of arbitrary Python objects from YAML files. The affected YAML files are /var/feast/feature_store.yaml and /var/feast/materialization_config.yaml. Because yaml.load with yaml.Loader does not restrict object instantiation, an attacker who can modify these YAML files can craft malicious payloads that execute arbitrary OS commands on the Kubernetes worker pod hosting the materializer job. This can lead to remote code execution (RCE) within the cluster environment. The vulnerability can be exploited before any configuration validation occurs, increasing the attack surface. Potential consequences include full cluster takeover, data poisoning attacks that corrupt feature store data, and supply-chain sabotage by manipulating data pipelines. The CVSS v3.0 base score is 7.8, reflecting high severity with local attack vector, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality, integrity, and availability. No public exploits are known at this time, but the vulnerability poses a significant risk to Kubernetes deployments running feast-dev/feast. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data), a common and dangerous security flaw in software that processes serialized input without proper validation or sandboxing.

Potential Impact

For European organizations, the impact of CVE-2025-11157 can be severe, especially those leveraging feast-dev/feast in Kubernetes-based data infrastructure or machine learning pipelines. Successful exploitation could lead to unauthorized remote code execution on worker pods, enabling attackers to escalate privileges, move laterally within the cluster, and potentially compromise other connected systems. This can result in data poisoning, undermining the integrity of machine learning models and analytics, which may have downstream effects on business decisions and regulatory compliance. Cluster takeover could disrupt availability of critical data services, causing operational downtime and financial losses. Additionally, supply-chain sabotage risks could affect organizations relying on feast-dev/feast as part of their data processing workflows, potentially impacting sectors like finance, healthcare, and manufacturing. Given the increasing adoption of Kubernetes and feast-dev/feast in European enterprises, the vulnerability poses a tangible threat to data security and operational continuity.

Mitigation Recommendations

To mitigate CVE-2025-11157, organizations should immediately restrict write access to the YAML configuration files (/var/feast/feature_store.yaml and /var/feast/materialization_config.yaml) to trusted administrators only, minimizing the risk of unauthorized modification. Implement strict Kubernetes RBAC policies to limit permissions on pods running feast-dev/feast materializer jobs. Replace the unsafe yaml.load calls with safe alternatives such as yaml.safe_load, which prevents arbitrary object deserialization. If upgrading feast-dev/feast to a patched version is available, prioritize applying the update. Employ runtime security tools to monitor for anomalous command execution within Kubernetes pods. Conduct regular audits of configuration files and Kubernetes cluster security posture. Use network segmentation to isolate critical data processing pods and enforce least privilege principles. Additionally, implement integrity checks or cryptographic validation on configuration files to detect unauthorized changes before deserialization occurs. Finally, incorporate security scanning into CI/CD pipelines to catch unsafe deserialization patterns during development.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2025-09-29T14:28:35.258Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6956f1e1db813ff03e8571ef

Added to database: 1/1/2026, 10:14:57 PM

Last enriched: 1/1/2026, 10:28:49 PM

Last updated: 1/8/2026, 5:31:40 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats