Description
A security issue was discovered in the Feast Feature Server's `/read-document` endpoint that allows an unauthenticated remote attacker to read any file accessible to the server process. By sending a specially crafted HTTP POST request, an attacker can bypass intended access restrictions to potentially retrieve sensitive system files, application configurations, and credentials.
Published: 2026-03-20
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized File Read
Action: Assess Impact
AI Analysis

Impact

The Feast Feature Server’s /read-document endpoint contains an unauthenticated remote file read vulnerability that allows attackers to retrieve any file the server process can access. By sending a specially crafted HTTP POST request, an attacker can bypass access restrictions and obtain sensitive system files, application configuration data, or credential files. This weakness corresponds to CWE‑22, or Path Traversal, and can lead to significant exposure of confidential information.

Affected Systems

The vulnerability affects Red Hat OpenShift AI (RHOAI). No specific versions are indicated in the advisory, so all deployments of RHOAI that include the Feast Feature Server are potentially impacted unless a later release has been applied.

Risk and Exploitability

The CVSS score is 7.5, indicating a high severity and a high potential impact. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely from any host able to reach the /read-document endpoint, requiring no authentication or special privileges. Without an available patch or workaround, the risk remains significant for systems exposing this endpoint.

Generated by OpenCVE AI on March 20, 2026 at 23:24 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.


OpenCVE Recommended Actions

  • Check with Red Hat for the latest security updates or patch releases for RHOAI that address the Feast Feature Server vulnerability.
  • If no patch is available, limit exposure by restricting network access to the /read-document endpoint, ideally blocking it from all but trusted management hosts.
  • Consider disabling or removing the Feast Feature Server service if it is not needed for your deployment.
  • Monitor inbound HTTP traffic to the /read-document endpoint for suspicious POST requests and review logs for potential exploitation attempts.
  • Apply general file‑system hardening practices, such as setting appropriate permissions on configuration files and protecting sensitive files outside the web‑root.

Generated by OpenCVE AI on March 20, 2026 at 23:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 20 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description A security issue was discovered in the Feast Feature Server's `/read-document` endpoint that allows an unauthenticated remote attacker to read any file accessible to the server process. By sending a specially crafted HTTP POST request, an attacker can bypass intended access restrictions to potentially retrieve sensitive system files, application configurations, and credentials.
Title Feast: unauthenticated arbitrary file read
First Time appeared Redhat
Redhat openshift Ai
Weaknesses CWE-22
CPEs cpe:/a:redhat:openshift_ai
Vendors & Products Redhat
Redhat openshift Ai
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Redhat Openshift Ai
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-24T16:08:56.090Z

Reserved: 2026-01-13T19:53:18.501Z

Link: CVE-2026-23536

cve-icon Vulnrichment

Updated: 2026-03-24T16:08:48.356Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T22:16:27.087

Modified: 2026-03-23T14:32:02.800

Link: CVE-2026-23536

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-20T00:00:00Z

Links: CVE-2026-23536 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:34:26Z

Weaknesses