Home

Description

Improper trust boundary enforcement in Kiro IDE before version 0.8.0 on all supported platforms might allow a remote unauthenticated threat actor to execute arbitrary code via maliciously crafted project directory files that bypass workspace trust protections when a local user opens the directory. To remediate this issue, users should upgrade to version 0.8.0 or higher.

PUBLISHED Reserved 2026-03-16 | Published 2026-03-17 | Updated 2026-03-18 | Assigner AMZN




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-829 Inclusion of functionality from untrusted control sphere

Product status

Default status
unaffected

0.1.0 (custom) before 0.8.0
affected

References

aws.amazon.com/security/security-bulletins/2026-009-AWS/ vendor-advisory

kiro.dev/changelog/ide/0-8/ release-notes

cve.org (CVE-2026-4295)

nvd.nist.gov (CVE-2026-4295)

Download JSON