Impact
Processing specially crafted workspace folder names permits an attacker to inject arbitrary operating system commands when a malicious workspace is opened. The resulting unauthorized command execution can compromise the integrity and confidentiality of the system hosting the Kiro IDE, allowing the attacker to execute any code with the permissions of the running process.
Affected Systems
AWS Kiro IDE versions prior to 0.6.18 are vulnerable. Users of any earlier version that interacts with GitLab Merge-Request helper and opens workspaces may be exposed through maliciously named folders.
Risk and Exploitability
The CVSS score of 8.4 indicates a high severity, reflecting the potential for full system compromise. The EPSS score of less than 1% suggests that, at the time of analysis, the likelihood of exploitation is low, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack would require an adversary to supply or lure a user into opening a crafted workspace, making the vector social engineering or supply chain dependent. Given the high severity and the low exploitation probability, organizations should prioritize mitigation but can monitor for attacks if delaying patching.
OpenCVE Enrichment