CVE-2026-5707

Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the virtual desktop host via a crafted session name. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment.
Configurations

Configuration 1 (hide)

cpe:2.3:a:amazon:research_and_engineering_studio:*:*:*:*:*:*:*:*

History

10 Apr 2026, 20:16

Type Values Removed Values Added
First Time Amazon research And Engineering Studio
Amazon
CPE cpe:2.3:a:amazon:research_and_engineering_studio:*:*:*:*:*:*:*:*
References () https://aws.amazon.com/security/security-bulletins/2026-014-aws/ - () https://aws.amazon.com/security/security-bulletins/2026-014-aws/ - Vendor Advisory
References () https://github.com/aws/res/issues/151 - () https://github.com/aws/res/issues/151 - Exploit, Issue Tracking
References () https://github.com/aws/res/releases/tag/2026.03 - () https://github.com/aws/res/releases/tag/2026.03 - Release Notes

06 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 22:16

Updated : 2026-04-10 20:16


NVD link : CVE-2026-5707

Mitre link : CVE-2026-5707

CVE.ORG link : CVE-2026-5707


JSON object : View

Products Affected

amazon

  • research_and_engineering_studio
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')