Jan 2, 2026·5 min read·3 visits
Feast <= 0.53.0 uses the unsafe `yaml.load()` method in its Kubernetes materializer component. This allows an attacker who can modify the materialization job's configuration (via Kubernetes ConfigMaps) to inject Python objects that execute code upon deserialization. The fix is a one-line change to `yaml.safe_load()` in version 0.54.0.
A high-severity deserialization vulnerability in the Feast machine learning feature store allows attackers with access to Kubernetes ConfigMaps to execute arbitrary code via malicious YAML tags.
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
feast Feast | <= 0.53.0 | 0.54.0 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-502 (Deserialization of Untrusted Data) |
| CVSS Score | 7.8 (High) |
| Attack Vector | Local / Config Injection |
| Library | PyYAML |
| Function | yaml.load(Loader=yaml.Loader) |
| EPSS Score | 0.00278 |
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.