Cleartext Sensitive Info in SageMaker Python SDK <v2.257.2/v3<3.8.0
CVE-2026-8596 Published on May 14, 2026
Cleartext storage of HMAC signing key in Amazon SageMaker Python SDK ModelBuilder/Serve path
Cleartext storage of sensitive information in the ModelBuilder/Serve component in Amazon SageMaker Python SDK before v2.257.2 and v3 before v3.8.0 might allow a remote authenticated actor to extract the HMAC signing key from SageMaker API responses and forge valid integrity signatures for specially crafted model artifacts, achieving code execution in inference containers. This issue requires a remote authenticated actor with permissions to call SageMaker describe APIs and S3 write access to the model artifact path.
To remediate this issue, we recommend upgrading to Amazon SageMaker Python SDK v2.257.2 or v3.8.0 and rebuild any models previously created with ModelBuilder using the updated SDK.
Vulnerability Analysis
CVE-2026-8596 is exploitable with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Cleartext Storage of Sensitive Information
The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere. Because the information is stored in cleartext, attackers could potentially read it. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
Products Associated with CVE-2026-8596
stack.watch emails you whenever new vulnerabilities are published in Amazon Aws or Amazonsagemakerpythonsdk Aws. Just hit a watch button to start following.
Affected Versions
Amazon SageMaker Python SDK AWS:- Version 2.199.0, <= 2.257.1 is affected.
- Version 3.0.0, <= 3.7.1 is affected.