Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-11157

CVE-2025-11157: Feast-dev/feast RCE Vulnerability

CVE-2025-11157 is a remote code execution flaw in feast-dev/feast version 0.53.0 affecting the Kubernetes materializer job. Attackers can execute OS commands by modifying YAML files. This article covers technical details, impact, and mitigation.

Updated: January 22, 2026

CVE-2025-11157 Overview

A high-severity insecure deserialization vulnerability exists in feast-dev/feast version 0.53.0, specifically in the Kubernetes materializer job located at feast/sdk/python/feast/infra/compute_engines/kubernetes/main.py. The vulnerability arises from the use of yaml.load(..., Loader=yaml.Loader) to deserialize /var/feast/feature_store.yaml and /var/feast/materialization_config.yaml. This method allows for the instantiation of arbitrary Python objects, enabling an attacker with the ability to modify these YAML files to execute OS commands on the worker pod. This vulnerability can be exploited before the configuration is validated, potentially leading to cluster takeover, data poisoning, and supply-chain sabotage.

Critical Impact

Remote code execution via YAML deserialization enabling full cluster compromise, data poisoning, and supply-chain attacks in Kubernetes environments running Feast feature stores.

Affected Products

  • feast-dev/feast version 0.53.0
  • Feast Kubernetes materializer component
  • Kubernetes-based Feast deployments using YAML configuration files

Discovery Timeline

  • 2026-01-01 - CVE CVE-2025-11157 published to NVD
  • 2026-01-02 - Last updated in NVD database

Technical Details for CVE-2025-11157

Vulnerability Analysis

This vulnerability is classified as CWE-502 (Deserialization of Untrusted Data). The core issue stems from the use of Python's yaml.load() function with the default yaml.Loader instead of the safer yaml.safe_load() alternative. When deserializing YAML content, the yaml.Loader class allows arbitrary Python object instantiation through YAML tags like !!python/object/apply: or !!python/object/new:. An attacker who gains write access to the configuration files can craft malicious YAML payloads that execute arbitrary Python code or system commands when the files are parsed.

The attack requires local access to modify the YAML configuration files in the worker pod filesystem. Once the malicious YAML is in place, code execution occurs during the materialization job initialization phase—before any configuration validation takes place. This pre-validation execution window makes the vulnerability particularly dangerous in automated pipeline environments.

Root Cause

The root cause is the use of yaml.load(f, Loader=yaml.Loader) to parse configuration files instead of yaml.safe_load(). The yaml.Loader class supports the full YAML specification, including Python-specific tags that enable arbitrary code execution. This design choice prioritizes feature completeness over security, creating an exploitable attack surface when configuration files can be influenced by untrusted sources.

Attack Vector

The attack vector is local, requiring the attacker to have the ability to modify YAML configuration files on the worker pod filesystem. Attack scenarios include:

  1. Compromised container images - Malicious YAML files baked into a modified container image
  2. ConfigMap/Secret manipulation - Kubernetes ConfigMaps or Secrets containing malicious YAML being mounted to the pod
  3. Supply chain compromise - Upstream repository poisoning or dependency confusion attacks
  4. Lateral movement - An attacker with initial cluster access modifying mounted volumes

The following patch demonstrates the security fix applied to address this vulnerability:

python
     logging.basicConfig(level=logging.INFO)
 
     with open("/var/feast/feature_store.yaml") as f:
-        feast_config = yaml.load(f, Loader=yaml.Loader)
+        feast_config = yaml.safe_load(f)
 
         with open("/var/feast/materialization_config.yaml") as b:
-            materialization_cfg = yaml.load(b, Loader=yaml.Loader)
+            materialization_cfg = yaml.safe_load(b)
 
             config = RepoConfig(**feast_config)
             store = FeatureStore(config=config)

Source: GitHub Commit Change

Detection Methods for CVE-2025-11157

Indicators of Compromise

  • Unexpected modifications to /var/feast/feature_store.yaml or /var/feast/materialization_config.yaml files
  • YAML files containing Python-specific tags such as !!python/object/apply:, !!python/object/new:, or !!python/module:
  • Unusual process execution originating from Feast materializer worker pods
  • Anomalous network connections from Kubernetes worker nodes running Feast jobs

Detection Strategies

  • Monitor Kubernetes audit logs for unauthorized ConfigMap or Secret modifications affecting Feast configurations
  • Implement file integrity monitoring on YAML configuration files within Feast pods
  • Scan container images for malicious YAML payloads containing Python object instantiation tags
  • Deploy runtime security tools to detect unexpected command execution in materializer pods

Monitoring Recommendations

  • Enable Kubernetes audit logging with focus on ConfigMap and Secret access events
  • Configure alerting for any process spawned by Feast materializer jobs that isn't part of normal operations
  • Implement network segmentation monitoring to detect lateral movement attempts from worker pods
  • Establish baseline behavior for Feast jobs to identify anomalous resource usage patterns

How to Mitigate CVE-2025-11157

Immediate Actions Required

  • Upgrade feast-dev/feast to the patched version that includes commit b2e37ff37953b68ae833f6874ab5bc510a4ca5fb
  • Audit all YAML configuration files for Python-specific object instantiation tags
  • Review Kubernetes RBAC policies to restrict who can modify ConfigMaps and Secrets used by Feast
  • Implement admission controllers to validate YAML content before deployment

Patch Information

The vulnerability has been addressed in the Feast repository. The fix replaces yaml.load(f, Loader=yaml.Loader) with yaml.safe_load(f) for all configuration file parsing. The security patch is available at commit b2e37ff37953b68ae833f6874ab5bc510a4ca5fb. Additional details about the vulnerability disclosure can be found on the Huntr Bounty Listing.

Workarounds

  • Implement strict filesystem permissions on YAML configuration files to prevent unauthorized modifications
  • Use Kubernetes Pod Security Policies or Pod Security Standards to run Feast pods with read-only root filesystems
  • Deploy OPA Gatekeeper or Kyverno policies to block ConfigMaps containing potentially malicious YAML tags
  • Isolate Feast workloads in dedicated namespaces with restricted network policies
bash
# Configuration example - Kubernetes Pod Security Context for read-only filesystem
# Apply this security context to Feast materializer pods
securityContext:
  readOnlyRootFilesystem: true
  runAsNonRoot: true
  runAsUser: 1000
  capabilities:
    drop:
      - ALL

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechFeast

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.31%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-502
  • Technical References
  • GitHub Commit Change

  • Huntr Bounty Listing
  • Related CVEs
  • CVE-2026-23536: Feast Feature Server File Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English