Impact
The vulnerability originates in the importFiles method within PersistNFS.java. The method is improperly handling file import requests, resulting in sensitive information being disclosed to anyone who can access the API. The flaw is classified as an information exposure and an improper access control weakness (CWE‑200 and CWE‑284). The result is that an attacker can read internal files or system data without authorization, potentially leaking configuration files, credentials, or other secrets.
Affected Systems
Affected systems are deployments of h2oai's h2o‑3 machine‑learning platform, up to version 7402. Any instance running h2o‑3 up to that build includes the insecure ImportFile API. The issue is present in the h2o-core module under PersistNFS.java.
Risk and Exploitability
The CVSS base score is 6.9, indicating a medium severity impact. The EPSS score is not available, but the vulnerability is publicly exploit‑able and may already be used by attackers. The flaw can be triggered remotely without authentication, as the API is exposed externally. The vulnerability is not currently listed in CISA’s KEV catalog. Given these factors, the risk to organizations that expose the ImportFile API is high enough to warrant prompt action.
OpenCVE Enrichment