Description
A security flaw has been discovered in FedML-AI FedML up to 0.8.9. This impacts an unknown function of the file FileUtils.java of the component MQTT Message Handler. Performing a manipulation of the argument dataSet results in path traversal. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access via Path Traversal
Action: Mitigate
AI Analysis

Impact

The flaw resides in FileUtils.java within the MQTT message handling component of FedML-AI FedML. By manipulating the argument dataSet, an attacker can perform a path traversal attack, enabling reading or writing of files outside the intended directory. This weakness can compromise confidentiality and integrity of the system’s files and configuration.

Affected Systems

FedML-AI’s FedML product, versions up to and including 0.8.9, is affected. No further version details are supplied.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. EPSS information is missing, and the vulnerability is not listed in the CISA KEV catalog. The description explicitly states the attack is possible remotely, likely via an MQTT interface that accepts a dataset parameter. An attacker who can send crafted MQTT messages could exploit the path traversal to gain unauthorized file access.

Generated by OpenCVE AI on April 5, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a version later than 0.8.9 if one exists.
  • If an upgrade is unavailable, isolate the affected host from external MQTT traffic using firewall rules or network segmentation.
  • Implement server‑side input validation to reject dataset arguments containing path traversal sequences.
  • Monitor MQTT logs for anomalous requests attempting to access protected files.
  • Check the vendor’s site or security advisories regularly for a future patch.

Generated by OpenCVE AI on April 5, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Tensoropera
Tensoropera fedml
CPEs cpe:2.3:a:tensoropera:fedml:*:*:*:*:*:*:*:*
Vendors & Products Tensoropera
Tensoropera fedml

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Fedml-ai
Fedml-ai fedml
Vendors & Products Fedml-ai
Fedml-ai fedml

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 03:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in FedML-AI FedML up to 0.8.9. This impacts an unknown function of the file FileUtils.java of the component MQTT Message Handler. Performing a manipulation of the argument dataSet results in path traversal. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title FedML-AI FedML MQTT Message FileUtils.java path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T15:36:13.025Z

Reserved: 2026-04-04T06:40:45.888Z

Link: CVE-2026-5535

cve-icon Vulnrichment

Updated: 2026-04-06T15:36:08.675Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-05T03:16:01.700

Modified: 2026-04-30T19:29:38.243

Link: CVE-2026-5535

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:19Z

Weaknesses