VYPR
Medium severity5.3NVD Advisory· Published May 17, 2026

CVE-2026-8750

CVE-2026-8750

Description

A vulnerability was identified in h2oai h2o-3 up to 7402. Affected by this issue is the function importFiles of the file h2o-core/src/main/java/water/persist/PersistNFS.java of the component ImportFile API. Such manipulation leads to information disclosure. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

H2O-3 ImportFiles endpoint lacks authentication and uses an incomplete path blacklist, allowing unauthenticated remote attackers to read arbitrary local files.

Vulnerability

Analysis

The vulnerability in H2O-3 (up to version 7402) resides in the ImportFiles API endpoint (POST /3/ImportFiles). The function importFiles in PersistNFS.java takes a user-supplied filesystem path and, after limited deny-glob checks (blocking paths like /etc and /proc), proceeds to import the file as an H2O frame. The endpoint is exposed without any authentication, authorization, or an allowlist of permitted import directories [1].

Exploitation

An unauthenticated attacker can send a POST request to /3/ImportFiles with a path parameter pointing to any server-readable local file not blocked by the deny glob (e.g., /root/buildinfo/labels.json). The file is then imported as an H2O frame. The attacker can subsequently retrieve the file content by making a GET request to /3/Frames/nfs://<path> [1]. No prior authentication or network position beyond reachability is required.

Impact

Successful exploitation allows an attacker to read arbitrary files from the server that are readable by the H2O-3 process. This can lead to disclosure of sensitive configuration files, credentials, or other data, compromising the confidentiality of the system [1].

Mitigation

Status

The vendor was contacted but did not respond. No official patch is available as of the publication date. Users should restrict network access to the H2O-3 API, implement a reverse proxy with authentication, or apply a filesystem allowlist if possible. The exploit is publicly available, increasing the risk of active exploitation [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • H2oai/H2o 3inferred2 versions
    <=7402+ 1 more
    • (no CPE)range: <=7402
    • (no CPE)range: <=7402

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.