CVE-2026-5429

Kiro · Kiro IDE

Kiro IDE is vulnerable to unsanitized input during web page generation in the Kiro Agent webview, which could lead to code execution or data theft.

Executive summary

Kiro IDE contains a high-severity input validation vulnerability that could allow an attacker to execute malicious scripts or gain unauthorized access via the Kiro Agent webview.

Vulnerability

The vulnerability is caused by unsanitized input during the generation of web pages within the Kiro Agent webview. This type of flaw typically allows for Cross-Site Scripting (XSS) or similar injection attacks where an attacker can inject malicious content into the IDE's interface.

Business impact

An attacker could exploit this flaw to steal developer credentials, access sensitive source code, or perform actions on behalf of the user within the IDE. The CVSS score of 7.8 reflects a High severity risk, particularly for organizations where the security of the development environment is paramount.

Remediation

Immediate Action: Update Kiro IDE to version 0 or higher immediately to resolve the input sanitization flaw.

Proactive Monitoring: Review webview logs and developer workstation activity for signs of unusual script execution or unauthorized network requests originating from the IDE.

Compensating Controls: Disable unnecessary plugins or agent features within the IDE until the update has been successfully applied across all development machines.

Exploitation status

Public Exploit Available: false

Analyst recommendation

It is critical to apply the primary update immediately. Organizations should also educate developers on the risks of injection vulnerabilities within their tooling and ensure that all development software is kept up to date.