Description
Improper neutralization of argument delimiters in the volume handling component in AWS EFS CSI Driver (aws-efs-csi-driver) before v3.0.1 allows remote authenticated users with PersistentVolume creation permissions to inject arbitrary mount options via comma injection.




To remediate this issue, users should upgrade to version v3.0.1
Published: 2026-04-17
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration change via mount option injection
Action: Patch
AI Analysis

Impact

The vulnerability arises from improper neutralization of argument delimiters in the volume handling component of AWS EFS CSI Driver. This flaw allows a remote authenticated user who has permission to create a PersistentVolume to inject arbitrary mount options by manipulating a comma delimiter. Through this injection, the attacker can alter the mount options used when the EFS file system is mounted within a Kubernetes cluster. The impact of these altered options depends on the options supplied; based on typical mount option semantics, the attacker might potentially influence access control or performance characteristics. The precise consequences are not explicitly stated in the advisory, but it is inferred that the attacker could use the injected options to affect permissions or data visibility.

Affected Systems

Affected products are the AWS EFS CSI Driver from Amazon, specifically all releases before version v3.0.1. Any Kubernetes cluster that uses these earlier driver versions is vulnerable unless the administrator applies the available patch.

Risk and Exploitability

The CVSS score for this issue is 6.9, indicating a moderate severity. The EPSS score is not provided, and the vulnerability is not listed in CISA KEV, suggesting it may not yet be actively exploited. The likely attack vector is remote authenticated access via PersistentVolume creation rights. The attack requires the attacker to possess PV creation privileges and therefore is limited to environments where access controls are misconfigured or overly permissive. If these conditions are met, the attacker could deploy pods that mount EFS volumes with malicious options.

Generated by OpenCVE AI on April 18, 2026 at 17:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the AWS EFS CSI Driver to version v3.0.1 or later, which contains the fix for the mount option injection flaw.
  • Restrict PersistentVolume creation permissions to only trusted users or service accounts, reducing the risk that an authenticated attacker can create malicious volumes.
  • Audit and enforce strict validation of mount options in the driver configuration, and monitor Kubernetes API logs for unexpected mount option values.

Generated by OpenCVE AI on April 18, 2026 at 17:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mph4-q2vm-w2pw Amazon EFS CSI Driver has mount option injection via unsanitized volumeHandle and mounttargetip fields
History

Fri, 17 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon aws Efs Csi Driver
Vendors & Products Amazon
Amazon aws Efs Csi Driver

Fri, 17 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description Improper neutralization of argument delimiters in the volume handling component in AWS EFS CSI Driver (aws-efs-csi-driver) before v3.0.1 allows remote authenticated users with PersistentVolume creation permissions to inject arbitrary mount options via comma injection. To remediate this issue, users should upgrade to version v3.0.1
Title AWS EFS CSI Driver Mount Option Injection
Weaknesses CWE-88
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Amazon Aws Efs Csi Driver
cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-04-17T19:57:02.728Z

Reserved: 2026-04-16T17:42:09.910Z

Link: CVE-2026-6437

cve-icon Vulnrichment

Updated: 2026-04-17T19:56:52.356Z

cve-icon NVD

Status : Received

Published: 2026-04-17T19:16:40.150

Modified: 2026-04-17T19:16:40.150

Link: CVE-2026-6437

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:15:05Z

Weaknesses