To remediate this issue, users should upgrade to version 2.1.14.
Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 19 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amazon
Amazon redshift Connector For Python |
|
| Vendors & Products |
Amazon
Amazon redshift Connector For Python |
Mon, 18 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client. To remediate this issue, users should upgrade to version 2.1.14. | |
| Title | Remote Code Execution via eval() Injection in amazon-redshift-python-driver | |
| First Time appeared |
Aws
Aws amazon Redshift Connector For Python |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:aws:amazon_redshift_connector_for_python:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aws
Aws amazon Redshift Connector For Python |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-05-19T12:56:12.712Z
Reserved: 2026-05-18T14:57:04.276Z
Link: CVE-2026-8838
Updated: 2026-05-19T12:56:06.228Z
Status : Awaiting Analysis
Published: 2026-05-18T21:16:41.623
Modified: 2026-05-19T14:24:20.997
Link: CVE-2026-8838
No data.
OpenCVE Enrichment
Updated: 2026-05-19T08:18:38Z