AWS RES 2025.x Unsanitized session name OS command exec as root
CVE-2026-5707 Published on April 6, 2026
Command Injection via Virtual Desktop Session Name in AWS Research and Engineering Studio (RES)
Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the virtual desktop host via a crafted session name.
To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment.
Vulnerability Analysis
CVE-2026-5707 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is a Shell injection Vulnerability?
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
CVE-2026-5707 has been classified to as a Shell injection vulnerability or weakness.
Affected Versions
AWS Research and Engineering Studio (RES):- Version 2025.03, <= 2025.12.01 is affected.