Vulnerability DatabaseGHSA-5pq3-h73f-66hr

GHSA-5pq3-h73f-66hr
JavaScript vulnerability analysis and mitigation

Overview

The AWS CDK CodePipeline vulnerability (GHSA-5pq3-h73f-66hr) is a security issue discovered in aws-cdk-lib versions prior to 2.184.0. The vulnerability involves overly broad trust policies in AWS IAM roles created by the CDK CodePipeline construct. When using CDK to create a CodePipeline with the CDK Construct Library, it creates AWS Identity and Access Management (IAM) trust policies that are too permissive, allowing any user with unrestricted sts:AssumeRole permissions to assume the role (GitHub Advisory).

Technical details

The vulnerability affects the AWS CodePipeline construct's role creation mechanism. When deploying CodePipeline using the CDK Construct Library, it creates several IAM roles, some of which have overly broad trust policies. Specifically, roles like 'PipelineProdPromoteToProd' and 'PipelineSourceYYY' can be assumed by the entire account rather than being restricted to specific services or roles. The vulnerability has been assigned a Low severity rating, affecting versions below 2.184.0 of aws-cdk-lib (GitHub Issue).

Impact

The impact of this vulnerability requires an actor to be authenticated in the AWS account and have unrestricted sts:AssumeRole permissions. If exploited, an attacker could gain access to various permissions depending on the pipeline's configured actions, including access to CloudFormation, CodeCommit, Lambda, ECS services, and the S3 bucket containing pipeline build artifacts (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in aws-cdk-lib version 2.184.0. The fix includes replacing the account root principal with the current pipeline role in the trust policy under the feature flag @aws-cdk/pipelines:reduceStageRoleTrustScope. Users should upgrade to version 2.184.0 or later to address this security issue (GitHub Release).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22787HIGH8.7
  • JavaScriptJavaScript
  • html2pdf.js
NoYesJan 14, 2026
CVE-2026-22820MEDIUM6.3
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22819MEDIUM5.9
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026
GHSA-73rr-hh4g-fpgxLOWN/A
  • JavaScriptJavaScript
  • diff
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management