← Back to CVEs
CVE-2026-6911
CRITICAL9.8
Description
Missing JWT signature verification in AWS Ops Wheel allows unauthenticated attackers to forge JWT tokens and gain unintended administrative access to the application, including the ability to read, modify, and delete all application data across tenants and manage Cognito user accounts within the deployment's User Pool, via a crafted JWT sent to the API Gateway endpoint. To remediate this issue, users should redeploy from the updated repository and ensure any forked or derivative code is patched to incorporate the new fixes.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/24/2026
Last Modified4/24/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-347
References
https://aws.amazon.com/security/security-bulletins/2026-018-aws/(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/aws/aws-ops-wheel/pull/164(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/aws/aws-ops-wheel/security/advisories/GHSA-v5vr-8w3c-37x2(ff89ba41-3aa1-4d27-914a-91399e9639e5)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.