Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5429: CWE-79 Improper neutralization of input during web page generation ('cross-site scripting') in AWS Kiro IDE

0
High
VulnerabilityCVE-2026-5429cvecve-2026-5429cwe-79
Published: Thu Apr 02 2026 (04/02/2026, 18:37:42 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: Kiro IDE

Description

Unsanitized input during web page generation in the Kiro Agent webview in Kiro IDE before version 0.8.140 allows a remote unauthenticated threat actor to execute arbitrary code via a potentially damaging crafted color theme name when a local user opens the workspace. This issue requires the user to trust the workspace when prompted. To remediate this issue, users should upgrade to version 0.8.140.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 19:29:30 UTC

Technical Analysis

CVE-2026-5429 is a cross-site scripting (CWE-79) vulnerability affecting AWS Kiro IDE prior to version 0.8.140. The flaw exists due to improper neutralization of input during web page generation within the Kiro Agent webview component. Specifically, the vulnerability is triggered by a crafted color theme name embedded in a workspace. When a local user opens such a workspace and accepts the prompt to trust it, the malicious input is rendered without adequate sanitization, enabling remote unauthenticated attackers to execute arbitrary code in the context of the IDE's webview. This can lead to full compromise of the IDE environment, including unauthorized access to sensitive data, modification of files, or disruption of IDE functionality. The attack vector requires user interaction—specifically, the user must trust the workspace upon prompt—limiting the ease of exploitation but still posing a significant risk. The vulnerability has a CVSS 3.1 base score of 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. AWS has addressed the issue in version 0.8.140, and users are strongly advised to upgrade. No public exploits have been reported yet, but the potential for damage is substantial given the ability to execute arbitrary code remotely.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary code within the Kiro IDE environment, potentially leading to full compromise of the development environment. This can result in unauthorized access to source code, credentials, and other sensitive data managed within the IDE. Integrity of code and configurations can be altered, leading to supply chain risks or introduction of malicious code. Availability may also be affected if the IDE or associated services are disrupted. Since the attack requires user trust of a malicious workspace, social engineering is a likely exploitation vector, increasing risk in environments where developers frequently open external or shared workspaces. Organizations relying on Kiro IDE for software development, especially those handling sensitive or proprietary code, face risks of intellectual property theft, code tampering, and operational disruption.

Mitigation Recommendations

1. Upgrade AWS Kiro IDE to version 0.8.140 or later immediately to apply the official patch addressing this vulnerability. 2. Implement strict policies to verify and validate all workspaces before trusting them, especially those obtained from external or untrusted sources. 3. Educate developers and users about the risks of trusting unknown workspaces and encourage skepticism of unsolicited workspace prompts. 4. Employ endpoint security solutions that can detect anomalous behavior within IDE environments, such as unexpected script execution or network activity. 5. Consider sandboxing or isolating development environments to limit the impact of potential code execution exploits. 6. Monitor IDE logs and network traffic for signs of exploitation attempts or unusual activity related to workspace loading. 7. Regularly review and update security awareness training to include emerging threats related to development tools and environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2026-04-02T15:46:40.727Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cec35ae6bfc5ba1dfb4ce4

Added to database: 4/2/2026, 7:28:26 PM

Last enriched: 4/2/2026, 7:29:30 PM

Last updated: 4/3/2026, 6:53:17 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses