CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-11157
7.80.28%

Feasting on YAML: How a Feature Store Configuration Became a Remote Code Execution Nightmare

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 2, 2026·5 min read·3 visits

PoC Available

Executive Summary (TL;DR)

Feast <= 0.53.0 uses the unsafe `yaml.load()` method in its Kubernetes materializer component. This allows an attacker who can modify the materialization job's configuration (via Kubernetes ConfigMaps) to inject Python objects that execute code upon deserialization. The fix is a one-line change to `yaml.safe_load()` in version 0.54.0.

A high-severity deserialization vulnerability in the Feast machine learning feature store allows attackers with access to Kubernetes ConfigMaps to execute arbitrary code via malicious YAML tags.

Official Patches

FeastGitHub Commit fixing the deserialization issue

Fix Analysis (1)

Technical Appendix

CVSS Score
7.8/ 10
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
0.28%
Top 88% most exploited

Affected Systems

Feast Feature Store (Python SDK)Kubernetes Clusters running Feast Materializers

Affected Versions Detail

Product
Affected Versions
Fixed Version
feast
Feast
<= 0.53.00.54.0
AttributeDetail
CWE IDCWE-502 (Deserialization of Untrusted Data)
CVSS Score7.8 (High)
Attack VectorLocal / Config Injection
LibraryPyYAML
Functionyaml.load(Loader=yaml.Loader)
EPSS Score0.00278

MITRE ATT&CK Mapping

T1059Command and Scripting Interpreter
Execution
T1562Impair Defenses
Defense Evasion
T1070Indicator Removal
Defense Evasion
CWE-502
Deserialization of Untrusted Data

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

Known Exploits & Detection

HypotheticalExploit involves injecting standard PyYAML RCE payloads into Kubernetes ConfigMaps.

Vulnerability Timeline

Patch committed to main branch
2025-01-15
Feast 0.54.0 Released
2025-01-20

References & Sources

  • [1]Feast Security Advisory
  • [2]PyYAML Documentation on Loading

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.