No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Fri, 20 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security issue was discovered in the Feast Feature Server's `/read-document` endpoint that allows an unauthenticated remote attacker to read any file accessible to the server process. By sending a specially crafted HTTP POST request, an attacker can bypass intended access restrictions to potentially retrieve sensitive system files, application configurations, and credentials. | |
| Title | Feast: unauthenticated arbitrary file read | |
| First Time appeared |
Redhat
Redhat openshift Ai |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:/a:redhat:openshift_ai | |
| Vendors & Products |
Redhat
Redhat openshift Ai |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-20T21:58:47.338Z
Reserved: 2026-01-13T19:53:18.501Z
Link: CVE-2026-23536
No data.
Status : Received
Published: 2026-03-20T22:16:27.087
Modified: 2026-03-20T22:16:27.087
Link: CVE-2026-23536
No data.
OpenCVE Enrichment
No data.