Description
A vulnerability was identified in h2oai h2o-3 up to 7402. Affected by this issue is the function importFiles of the file h2o-core/src/main/java/water/persist/PersistNFS.java of the component ImportFile API. Such manipulation leads to information disclosure. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-17
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability originates in the importFiles method within PersistNFS.java. The method is improperly handling file import requests, resulting in sensitive information being disclosed to anyone who can access the API. The flaw is classified as an information exposure and an improper access control weakness (CWE‑200 and CWE‑284). The result is that an attacker can read internal files or system data without authorization, potentially leaking configuration files, credentials, or other secrets.

Affected Systems

Affected systems are deployments of h2oai's h2o‑3 machine‑learning platform, up to version 7402. Any instance running h2o‑3 up to that build includes the insecure ImportFile API. The issue is present in the h2o-core module under PersistNFS.java.

Risk and Exploitability

The CVSS base score is 6.9, indicating a medium severity impact. The EPSS score is not available, but the vulnerability is publicly exploit‑able and may already be used by attackers. The flaw can be triggered remotely without authentication, as the API is exposed externally. The vulnerability is not currently listed in CISA’s KEV catalog. Given these factors, the risk to organizations that expose the ImportFile API is high enough to warrant prompt action.

Generated by OpenCVE AI on May 17, 2026 at 12:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update h2oai h2o‑3 to a version newer than 7402 where the importFiles method is secured.
  • If an update cannot be applied immediately, restrict the ImportFile API to trusted networks or enforce strong authentication to limit exposure.
  • Monitor application logs for suspicious importFiles activity and audit for unauthorized data disclosures.

Generated by OpenCVE AI on May 17, 2026 at 12:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 17 May 2026 11:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in h2oai h2o-3 up to 7402. Affected by this issue is the function importFiles of the file h2o-core/src/main/java/water/persist/PersistNFS.java of the component ImportFile API. Such manipulation leads to information disclosure. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title h2oai h2o-3 ImportFile API PersistNFS.java importFiles information disclosure
First Time appeared H2oai
H2oai h2o-3
Weaknesses CWE-200
CWE-284
CPEs cpe:2.3:a:h2oai:h2o-3:*:*:*:*:*:*:*:*
Vendors & Products H2oai
H2oai h2o-3
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-17T10:45:10.231Z

Reserved: 2026-05-16T16:20:42.111Z

Link: CVE-2026-8750

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T11:16:35.423

Modified: 2026-05-17T11:16:35.423

Link: CVE-2026-8750

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T13:30:02Z

Weaknesses