Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client.
To remediate this issue, users should upgrade to version 2.1.14.
To remediate this issue, users should upgrade to version 2.1.14.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 18 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client. To remediate this issue, users should upgrade to version 2.1.14. | |
| Title | Remote Code Execution via eval() Injection in amazon-redshift-python-driver | |
| First Time appeared |
Aws
Aws amazon Redshift Connector For Python |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:aws:amazon_redshift_connector_for_python:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aws
Aws amazon Redshift Connector For Python |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-05-18T20:19:16.159Z
Reserved: 2026-05-18T14:57:04.276Z
Link: CVE-2026-8838
No data.
No data.
No data.
OpenCVE Enrichment
No data.
Weaknesses