Vulnerability Description
Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client. To remediate this issue, users should upgrade to version 2.1.14.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://aws.amazon.com/security/security-bulletins/2026-033-aws/
- https://github.com/aws/amazon-redshift-python-driver/releases/tag/v2.1.14
- https://github.com/aws/amazon-redshift-python-driver/security/advisories/GHSA-29
FAQ
What is CVE-2026-8838?
CVE-2026-8838 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary c...
How severe is CVE-2026-8838?
CVE-2026-8838 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-8838?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.