Saturday, May 24, 2025
HomeCVE/vulnerabilityCritical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code

Critical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code

Published on

SIEM as a Service

Follow Us on Google News

Amazon Web Services (AWS) has addressed a critical security flaw (CVE-2025-4318) in its AWS Amplify Studio platform, which could have allowed authenticated attackers to execute malicious JavaScript code during component rendering.

The vulnerability, publicly disclosed on May 5, 2025, affects the amplify-codegen-ui package, a core tool for generating front-end code in Amplify Studio.

Vulnerability Details

The flaw resides in how the expression-binding function processes UI component schemas when using the create-component command.

- Advertisement - Google News

Attackers exploiting this input validation issue could inject arbitrary code into component properties, triggering execution during rendering or builds.

CVE IDSeverityAffected ProductAffected VersionsFixed Version
CVE-2025-4318CriticalAWS Amplify Studio (amplify-codegen-ui)≤2.20.22.20.3
  • Arbitrary Code Execution: Attackers with component creation/modification privileges could compromise backend systems.
  • Data Theft or Service Disruption: Malicious scripts might exfiltrate sensitive data or disrupt application workflows.
  • Supply Chain Attacks: Compromised components could spread to downstream applications.

AWS confirmed no active exploits were detected in the wild before patching.

Mitigation Steps

  1. Upgrade Immediately: Update to amplify-codegen-ui version 2.20.3 via the AWS CLI or Amplify Studio interface.
  2. Audit Custom Components: Review component schemas for unexpected code snippets.
  3. Restrict Permissions: Limit component editing rights to trusted users.

“We strongly recommend upgrading and auditing derivative codebases,” stated the AWS Security team.

Best Practices for Amplify Studio Users

  • Monitor Build Logs: Watch for unusual activity in component rendering pipelines.
  • Enable AWS CloudTrail: Track API calls related to component modifications.
  • Validate Third-Party Components: Scan imported schemas for untrusted code.

AWS urges users to report concerns to aws-security@amazon.com and stay updated via the AWS Security Bulletin Hub.

Impacted Industries: E-commerce, SaaS platforms, and enterprises relying on Amplify Studio for rapid UI development.

This incident highlights the importance of rigorous input validation in low-code environments. Developers using forked versions of amplify-codegen-ui must manually apply the official fix.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...