To remediate this issue, users should upgrade to version 0.8.0 or higher.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 18 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aws
Aws kiro Ide |
|
| Vendors & Products |
Aws
Aws kiro Ide |
Tue, 17 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper trust boundary enforcement in Kiro IDE before version 0.8.0 on all supported platforms might allow a remote unauthenticated threat actor to execute arbitrary code via maliciously crafted project directory files that bypass workspace trust protections when a local user opens the directory. To remediate this issue, users should upgrade to version 0.8.0 or higher. | |
| Title | Arbitrary code execution via crafted project files in Kiro IDE | |
| Weaknesses | CWE-829 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-03-18T14:07:58.063Z
Reserved: 2026-03-16T17:38:37.520Z
Link: CVE-2026-4295
Updated: 2026-03-18T14:07:48.006Z
Status : Received
Published: 2026-03-17T20:16:14.840
Modified: 2026-03-17T20:16:14.840
Link: CVE-2026-4295
No data.
OpenCVE Enrichment
Updated: 2026-03-18T10:42:54Z