Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client.
To remediate this issue, users should upgrade to version 2.1.14.
Metrics
Affected Vendors & Products
References
History
Tue, 19 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amazon
Amazon redshift Connector For Python |
|
| Vendors & Products |
Amazon
Amazon redshift Connector For Python |
Mon, 18 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client. To remediate this issue, users should upgrade to version 2.1.14. | |
| Title | Remote Code Execution via eval() Injection in amazon-redshift-python-driver | |
| First Time appeared |
Aws
Aws amazon Redshift Connector For Python |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:aws:amazon_redshift_connector_for_python:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aws
Aws amazon Redshift Connector For Python |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published: 2026-05-18T20:15:37.933Z
Updated: 2026-05-19T12:56:12.712Z
Reserved: 2026-05-18T14:57:04.276Z
Link: CVE-2026-8838
Updated: 2026-05-19T12:56:06.228Z
Status : Awaiting Analysis
Published: 2026-05-18T21:16:41.623
Modified: 2026-05-19T14:24:20.997
Link: CVE-2026-8838
No data.