Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio (RES) version 2024.10 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands on the cluster-manager EC2 instance via crafted input when using the FileBrowser functionality.
To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aws
Aws research And Engineering Studio |
|
| Vendors & Products |
Aws
Aws research And Engineering Studio |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio (RES) version 2024.10 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands on the cluster-manager EC2 instance via crafted input when using the FileBrowser functionality. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment. | |
| Title | AWS Research and Engineering Studio (RES) FileBrowser Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published: 2026-04-06T21:32:04.058Z
Updated: 2026-04-06T21:32:04.058Z
Reserved: 2026-04-06T16:11:19.793Z
Link: CVE-2026-5709
No data.
Status : Received
Published: 2026-04-06T22:16:25.627
Modified: 2026-04-06T22:16:25.627
Link: CVE-2026-5709
No data.