Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client.
To remediate this issue, users should upgrade to version 2.1.14.
Metrics
Affected Vendors & Products
References
History
Mon, 18 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client. To remediate this issue, users should upgrade to version 2.1.14. | |
| Title | Remote Code Execution via eval() Injection in amazon-redshift-python-driver | |
| First Time appeared |
Aws
Aws amazon Redshift Connector For Python |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:aws:amazon_redshift_connector_for_python:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aws
Aws amazon Redshift Connector For Python |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-05-18T20:19:16.159Z
Reserved: 2026-05-18T14:57:04.276Z
Link: CVE-2026-8838
No data.
Status : Received
Published: 2026-05-18T21:16:41.623
Modified: 2026-05-18T21:16:41.623
Link: CVE-2026-8838
No data.
OpenCVE Enrichment
Updated: 2026-05-18T21:30:15Z