Arbitrary Command Injection Vulnerability in Kiro GitLab Merge-Request Helper
CVE-2026-0830

8.4HIGH

Key Information:

Vendor

Aws

Status
Vendor
CVE Published:
9 January 2026

What is CVE-2026-0830?

CVE-2026-0830 is a security vulnerability present in the Kiro GitLab Merge-Request Helper, integrated within the Kiro Integrated Development Environment (IDE), which is used for managing and facilitating code merges in GitLab projects. The flaw arises from the improper handling of specially crafted workspace folder names. This vulnerability allows malicious actors to execute arbitrary commands on systems utilizing the affected software, specifically versions prior to 0.6.18 of Kiro IDE. The potential exploitation of this vulnerability can lead to severe operational disruptions, data compromise, and unauthorized control over affected systems, posing significant risks to organizations that rely on this tool for their development processes.

Potential impact of CVE-2026-0830

  1. Arbitrary Command Execution: The vulnerability allows attackers to inject and execute arbitrary commands, which can lead to full system compromise and unauthorized access to sensitive data.

  2. Integration Risks: As Kiro IDE is often used in conjunction with GitLab, successful exploitation may provide attackers with access to version control systems, enabling them to manipulate code repositories or introduce malicious code.

  3. Operational Disruption: Exploitation of this vulnerability could result in significant downtime, impacting development workflows and potentially causing delays in project timelines as organizations scramble to secure their environments and deploy patches.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Kiro IDE 0 < 0.6.18

References

CVSS V4

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.