CVE-2026-6912 PUBLISHED

Privilege Escalation via Self-Writable Cognito Custom Attribute in AWS Ops Wheel

Assigner: AMZN
Reserved: 23.04.2026 Published: 24.04.2026 Updated: 24.04.2026

Improperly controlled modification of dynamically-determined object attributes in the Cognito User Pool configuration in AWS Ops Wheel before PR #165 allows remote authenticated users to escalate to deployment admin privileges and manage Cognito user accounts via a crafted UpdateUserAttributes API call that sets the custom:deployment_admin attribute.

To remediate this issue, users should redeploy from the updated repository and ensure any forked or derivative code is patched to incorporate the new fixes.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
CVSS Score: 8.7

Product Status

Vendor AWS
Product AWS Ops Wheel
Versions Default: unaffected
  • affected from 0 to 164 (excl.)

References

Problem Types

  • CWE-915 Improperly controlled modification of Dynamically-Determined object attributes CWE

Impacts

  • CAPEC-233 Privilege Escalation