Amplify Studio: Unvalidated Inputs in amplify-codegen-ui May Allow JS Injection
CVE-2025-4318 Published on May 5, 2025

Input validation issue in AWS Amplify Studio UI component properties
The AWS Amplify Studio UI component property expressions in the aws-amplify/amplify-codegen-ui package lack input validation. This could potentially allow an authenticated user who has access to create or modify components to run arbitrary JavaScript code during the component rendering and build process.

Vendor Advisory Vendor Advisory NVD

Weakness Type

What is an Eval Injection Vulnerability?

The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval"). This may allow an attacker to execute arbitrary code, or at least modify what code can be executed.

CVE-2025-4318 has been classified to as an Eval Injection vulnerability or weakness.


Products Associated with CVE-2025-4318

Want to know whenever a new CVE is published for Amazon Aws? stack.watch will email you.

 

Affected Versions

Amazon Amplify Studio:

Exploit Probability

EPSS
0.53%
Percentile
66.86%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.