Impact
The Feast Feature Server’s /read-document endpoint contains an unauthenticated remote file read vulnerability that allows attackers to retrieve any file the server process can access. By sending a specially crafted HTTP POST request, an attacker can bypass access restrictions and obtain sensitive system files, application configuration data, or credential files. This weakness corresponds to CWE‑22, or Path Traversal, and can lead to significant exposure of confidential information.
Affected Systems
The vulnerability affects Red Hat OpenShift AI (RHOAI). No specific versions are indicated in the advisory, so all deployments of RHOAI that include the Feast Feature Server are potentially impacted unless a later release has been applied.
Risk and Exploitability
The CVSS score is 7.5, indicating a high severity and a high potential impact. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely from any host able to reach the /read-document endpoint, requiring no authentication or special privileges. Without an available patch or workaround, the risk remains significant for systems exposing this endpoint.
OpenCVE Enrichment