Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4295: CWE-829 Inclusion of functionality from untrusted control sphere in AWS Kiro IDE

0
High
VulnerabilityCVE-2026-4295cvecve-2026-4295cwe-829
Published: Tue Mar 17 2026 (03/17/2026, 19:11:58 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: Kiro IDE

Description

CVE-2026-4295 is a high-severity vulnerability in AWS Kiro IDE versions prior to 0. 8. 0 that allows remote unauthenticated attackers to execute arbitrary code. The flaw arises from improper trust boundary enforcement (CWE-829) where maliciously crafted project directory files can bypass workspace trust protections when a local user opens the directory. Exploitation requires the attacker to place malicious files in a project directory that the user subsequently opens, triggering code execution. The vulnerability affects all supported platforms of Kiro IDE version 0. 1. 0 and earlier. No known exploits are currently in the wild. AWS has released version 0.

AI-Powered Analysis

AILast updated: 03/17/2026, 19:58:26 UTC

Technical Analysis

CVE-2026-4295 is a critical security vulnerability identified in AWS Kiro IDE, an integrated development environment used by developers across multiple platforms. The root cause is improper enforcement of trust boundaries (CWE-829), which means the IDE fails to correctly validate the trustworthiness of project directory files before loading them. Specifically, maliciously crafted files within a project directory can bypass the workspace trust protections designed to prevent execution of untrusted code. When a local user opens such a compromised project directory, the malicious code embedded in these files can execute arbitrary commands on the user's system without requiring authentication. This vulnerability affects all supported platforms running Kiro IDE versions before 0.8.0, notably version 0.1.0. The attack vector is local (AV:L), requiring the user to open the malicious directory (UI:R), but no privileges or authentication are needed (PR:N). The impact on confidentiality, integrity, and availability is high, as arbitrary code execution can lead to full system compromise. AWS has addressed this issue in version 0.8.0 and later, urging users to upgrade. Although no exploits are currently known in the wild, the vulnerability's characteristics make it a significant risk for developers and organizations relying on Kiro IDE for software development.

Potential Impact

The vulnerability allows remote unauthenticated attackers to execute arbitrary code on systems running vulnerable versions of AWS Kiro IDE, potentially leading to full system compromise. This can result in unauthorized data access, modification, or deletion, disruption of development workflows, and the introduction of malicious code into software projects. Since the attack requires user interaction (opening a malicious project directory), social engineering or supply chain attacks could be leveraged to deliver the malicious files. Organizations using Kiro IDE in development environments risk intellectual property theft, insertion of backdoors into software, and broader network compromise if the IDE is used on machines connected to sensitive infrastructure. The high CVSS score (7.8) reflects the serious nature of the threat, especially in environments where developers frequently open project directories from external sources or shared repositories. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of patching.

Mitigation Recommendations

1. Immediately upgrade all instances of AWS Kiro IDE to version 0.8.0 or later, as this version contains the fix for the vulnerability. 2. Implement strict controls on project directory sources, ensuring that only trusted and verified directories are opened within the IDE. 3. Educate developers and users about the risks of opening project directories from untrusted or unknown sources to reduce the likelihood of social engineering attacks. 4. Employ endpoint protection solutions capable of detecting suspicious file activities and code execution attempts originating from IDE processes. 5. Use application whitelisting and sandboxing techniques to limit the impact of any potential code execution. 6. Monitor development environments for unusual behavior or unexpected network activity that could indicate exploitation attempts. 7. Integrate secure software supply chain practices, including scanning project files for malicious content before use. 8. Regularly audit and update development tools to ensure vulnerabilities are promptly addressed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2026-03-16T17:38:37.520Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9aedc771bdb1749d15203

Added to database: 3/17/2026, 7:43:24 PM

Last enriched: 3/17/2026, 7:58:26 PM

Last updated: 3/18/2026, 7:05:35 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses