CVE-2026-5429
Kiro · Kiro IDE
Kiro IDE is vulnerable to unsanitized input during web page generation in the Kiro Agent webview, which could lead to code execution or data theft.
Executive summary
Kiro IDE contains a high-severity input validation vulnerability that could allow an attacker to execute malicious scripts or gain unauthorized access via the Kiro Agent webview.
Vulnerability
The vulnerability is caused by unsanitized input during the generation of web pages within the Kiro Agent webview. This type of flaw typically allows for Cross-Site Scripting (XSS) or similar injection attacks where an attacker can inject malicious content into the IDE's interface.
Business impact
An attacker could exploit this flaw to steal developer credentials, access sensitive source code, or perform actions on behalf of the user within the IDE. The CVSS score of 7.8 reflects a High severity risk, particularly for organizations where the security of the development environment is paramount.
Remediation
Immediate Action: Update Kiro IDE to version 0 or higher immediately to resolve the input sanitization flaw.
Proactive Monitoring: Review webview logs and developer workstation activity for signs of unusual script execution or unauthorized network requests originating from the IDE.
Compensating Controls: Disable unnecessary plugins or agent features within the IDE until the update has been successfully applied across all development machines.
Exploitation status
Public Exploit Available: false
Analyst recommendation
It is critical to apply the primary update immediately. Organizations should also educate developers on the risks of injection vulnerabilities within their tooling and ensure that all development software is kept up to date.