CVE-2026-8178 PUBLISHED

Remote Code Execution via Unsafe Class Loading in Amazon Redshift JDBC Driver

Assigner: AMZN
Reserved: 08.05.2026 Published: 08.05.2026 Updated: 08.05.2026

An issue exists in Amazon Redshift JDBC Driver versions prior to 2.2.2. Under certain conditions, the driver could load and execute arbitrary classes when processing JDBC connection URL parameters. An actor who can influence the connection URL could potentially execute code in the application context, provided a suitable class is available on the application's classpath.

To mitigate this issue, users should upgrade to version 2.2.2 or later.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.2

Product Status

Vendor Amazon
Product Amazon Redshift JDBC Driver
Versions Default: unaffected
  • Version 2.2.2 is unaffected

References

Problem Types

  • CWE-470: Use of Externally-Controlled Input to Select Classes or Code CWE

Impacts

  • CAPEC-138: Reflection Injection