A security issue was discovered in the Feast Feature Server's `/read-document` endpoint that allows an unauthenticated remote attacker to read any file accessible to the server process. By sending a specially crafted HTTP POST request, an attacker can bypass intended access restrictions to potentially retrieve sensitive system files, application configurations, and credentials.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security issue was discovered in the Feast Feature Server's `/read-document` endpoint that allows an unauthenticated remote attacker to read any file accessible to the server process. By sending a specially crafted HTTP POST request, an attacker can bypass intended access restrictions to potentially retrieve sensitive system files, application configurations, and credentials. | |
| Title | Feast: unauthenticated arbitrary file read | |
| First Time appeared |
Redhat
Redhat openshift Ai |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:/a:redhat:openshift_ai | |
| Vendors & Products |
Redhat
Redhat openshift Ai |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2026-03-20T21:58:47.338Z
Updated: 2026-03-20T21:58:47.338Z
Reserved: 2026-01-13T19:53:18.501Z
Link: CVE-2026-23536
No data.
Status : Received
Published: 2026-03-20T22:16:27.087
Modified: 2026-03-20T22:16:27.087
Link: CVE-2026-23536
No data.
ReportizFlow