CVE-2026-4295 PUBLISHED

Arbitrary code execution via crafted project files in Kiro IDE

Assigner: AMZN
Reserved: 16.03.2026 Published: 17.03.2026 Updated: 18.03.2026

Improper trust boundary enforcement in Kiro IDE before version 0.8.0 on all supported platforms might allow a remote unauthenticated threat actor to execute arbitrary code via maliciously crafted project directory files that bypass workspace trust protections when a local user opens the directory.

To remediate this issue, users should upgrade to version 0.8.0 or higher.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.5

Product Status

Vendor AWS
Product Kiro IDE
Versions Default: unaffected
  • affected from 0.1.0 to 0.8.0 (excl.)

References

Problem Types

  • CWE-829 Inclusion of functionality from untrusted control sphere CWE

Impacts

  • CAPEC-242 Code Injection