CVE-2025-3048
Python vulnerability analysis and mitigation

Overview

The AWS Serverless Application Model Command Line Interface (AWS SAM CLI) contains a vulnerability identified as CVE-2025-3048. The issue was discovered in versions <= v1.133.0 and has been patched in version 1.134.0. When completing a build with AWS SAM CLI that includes symlinks, the content of those symlinks are copied to the cache of the local workspace as regular files or directories, allowing unauthorized access to symlinked content via the local workspace (AWS Bulletin, NVD).

Technical details

The vulnerability is classified with a CVSS v3.1 Base Score of 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N. The issue stems from improper handling of symlinks during the build process, where the AWS SAM CLI copies symlinked content to the local workspace cache without proper access control verification. This is categorized under CWE-22 (Path Traversal) and CWE-497 (Exposure of Sensitive System Information) (GitHub Advisory, Security Lab).

Impact

The vulnerability's impact is limited to the local workspace and does not affect AWS services, production environments, or cross-account resources. However, it could allow users to access content of symlinked files in the SAM CLI cache that they would not normally have access to outside of the Docker container (GitHub Advisory).

Mitigation and workarounds

Users should upgrade to AWS SAM CLI version 1.134.0 or newer to address this vulnerability. After upgrading, it is crucial to re-build applications using the 'sam build --use-container' command to update the symlinks. There are no recommended workarounds, and users should ensure any forked or derivative code is patched to incorporate the new fixes (AWS Bulletin).

Community reactions

The GitHub Security Lab, through Kevin Backhouse, collaborated with AWS on this issue through the coordinated vulnerability disclosure process. AWS has acknowledged and addressed the vulnerability promptly by releasing a patch (Security Lab).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management