To remediate this issue, users should upgrade to version 0.8.0 or higher.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 18 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aws
Aws kiro Ide |
|
| Vendors & Products |
Aws
Aws kiro Ide |
Tue, 17 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper trust boundary enforcement in Kiro IDE before version 0.8.0 on all supported platforms might allow a remote unauthenticated threat actor to execute arbitrary code via maliciously crafted project directory files that bypass workspace trust protections when a local user opens the directory. To remediate this issue, users should upgrade to version 0.8.0 or higher. | |
| Title | Arbitrary code execution via crafted project files in Kiro IDE | |
| Weaknesses | CWE-829 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-03-18T14:07:58.063Z
Reserved: 2026-03-16T17:38:37.520Z
Link: CVE-2026-4295
Updated: 2026-03-18T14:07:48.006Z
Status : Awaiting Analysis
Published: 2026-03-17T20:16:14.840
Modified: 2026-03-18T14:52:44.227
Link: CVE-2026-4295
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:54:43Z