Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4295: CWE-829 Inclusion of functionality from untrusted control sphere in AWS Kiro IDE

0
High
VulnerabilityCVE-2026-4295cvecve-2026-4295cwe-829
Published: Tue Mar 17 2026 (03/17/2026, 19:11:58 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: Kiro IDE

Description

CVE-2026-4295 is a high-severity vulnerability in AWS Kiro IDE versions before 0. 8. 0 that allows remote unauthenticated attackers to execute arbitrary code. The issue arises from improper trust boundary enforcement, specifically CWE-829, where maliciously crafted project directory files can bypass workspace trust protections when a local user opens the directory. Exploitation requires the attacker to place malicious files in a project directory that a user subsequently opens in the IDE, triggering code execution. Although no known exploits are currently in the wild, the vulnerability impacts confidentiality, integrity, and availability with a CVSS score of 7. 8. Users should upgrade to version 0. 8. 0 or later to remediate the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:12:08 UTC

Technical Analysis

CVE-2026-4295 is a vulnerability identified in AWS Kiro IDE, a development environment product, affecting all supported platforms running versions prior to 0.8.0. The root cause is improper enforcement of trust boundaries (CWE-829), where the IDE fails to correctly validate the trustworthiness of project directory files. This flaw allows a remote, unauthenticated attacker to craft malicious project directories that, when opened by a local user in the IDE, bypass workspace trust protections and lead to arbitrary code execution. The attack vector requires the attacker to have the ability to place or influence files in a project directory accessible to the user, but does not require prior authentication. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution could lead to data theft, system compromise, or denial of service. The CVSS v3.1 base score is 7.8, reflecting high severity with local attack vector, low attack complexity, no privileges required, but user interaction needed. No known exploits have been reported in the wild yet. The recommended remediation is upgrading to version 0.8.0 or higher, where the trust boundary enforcement has been corrected. This vulnerability is critical for organizations relying on AWS Kiro IDE for software development, as it could be leveraged to compromise developer workstations and potentially the software supply chain.

Potential Impact

The vulnerability poses a significant risk to organizations using AWS Kiro IDE, particularly software development teams. Successful exploitation can lead to arbitrary code execution on developer machines, compromising sensitive source code, credentials, and build environments. This can result in intellectual property theft, insertion of malicious code into software builds, and potential lateral movement within corporate networks. The compromise of developer workstations can also undermine software supply chain security, affecting downstream customers and partners. Additionally, availability may be impacted if attackers disrupt IDE functionality or system stability. Given the widespread use of AWS services and the increasing adoption of cloud-based IDEs, the impact could be broad, affecting organizations of all sizes and sectors that rely on Kiro IDE for development. The requirement for user interaction (opening a malicious project directory) somewhat limits automated exploitation but does not eliminate risk, especially in environments where project directories are shared or sourced externally.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade all instances of AWS Kiro IDE to version 0.8.0 or later, where the trust boundary enforcement issue has been resolved. Additionally, implement strict controls on project directory sources by validating and restricting the origin of project files, especially those obtained from untrusted or external sources. Employ endpoint protection solutions capable of detecting suspicious file activities and monitor for unusual IDE behaviors. Educate developers on the risks of opening project directories from unknown or unverified sources and encourage the use of sandboxed environments for testing new projects. Incorporate code signing and integrity verification for project files where possible. Network segmentation and least privilege principles should be applied to limit the impact of any potential compromise. Regularly audit and update development tools and dependencies to ensure timely application of security patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2026-03-16T17:38:37.520Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9aedc771bdb1749d15203

Added to database: 3/17/2026, 7:43:24 PM

Last enriched: 3/25/2026, 1:12:08 AM

Last updated: 5/2/2026, 4:49:35 AM

Views: 115

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses