Mount Option Injection Flaw in Amazon EFS CSI Driver
AWS disclosed CVE-2026-6437, a mount option injection vulnerability in the Amazon EFS CSI Driver that stems from insufficient input validation before user-controlled values are passed to the operating system's mount helper. In affected versions prior to 3.0.1, Kubernetes PersistentVolume attributes including mounttargetip and volumeHandle can be crafted with injected comma-separated values that the Linux mount process interprets as additional mount options.
Because the driver builds the mount option string directly from those fields and executes with elevated privileges on Kubernetes nodes, an attacker could cause unauthorized mount flags to be applied to the target EFS filesystem during the CSI driver's mount operation. The flaw affects environments using vulnerable EFS CSI Driver releases, and the reported remediation is to upgrade to version 3.0.1 or later.
Timeline
Apr 18, 2026
Technical details published for mount option injection flaw
A CVE report described that affected Amazon EFS CSI Driver versions prior to 3.0.1 insufficiently validate PersistentVolume attributes such as mounttargetip and volumeHandle, allowing injected mount options to influence Linux mount behavior with elevated privileges.
Apr 17, 2026
AWS discloses CVE-2026-6437 in Amazon EFS CSI Driver
AWS published Security Bulletin 2026-016 for CVE-2026-6437, identifying a mount option injection vulnerability in the Amazon EFS CSI Driver.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Related Entities
Vulnerabilities
Organizations
Affected Products
Sources
Related Stories

OS Command Injection in Amazon ECS Agent for Windows via FSx Volume Credentials
Amazon disclosed `CVE-2026-7461`, an OS command injection flaw in the Amazon ECS Agent for Windows that can let a remote authenticated actor execute shell commands as `SYSTEM` on the underlying host. The vulnerability affects ECS agent versions `1.47.0` through `1.102.2` and stems from improper input validation during the mounting of FSx Windows File Server volumes, where a specially crafted username field in an ECS task definition can trigger command execution. The issue is limited to ECS Windows worker instances and does not affect ECS on Fargate. Amazon said exploitation requires the ability to register ECS task definitions or to modify credentials in AWS Secrets Manager or SSM Parameter Store referenced by the FSx volume configuration. The company fixed the flaw in ECS agent version `1.103.0` and advised customers to upgrade to the latest ECS-optimized Windows AMI; as interim mitigations, AWS recommended restricting `ecs:RegisterTaskDefinition` permissions and limiting write access to the affected secrets.
Yesterday
Path Traversal in Kubernetes CSI Driver for NFS
A **path traversal vulnerability** in the Kubernetes **CSI Driver for NFS** (`nfs.csi.k8s.io`) could allow attackers with permission to create `PersistentVolume` objects to supply crafted `volumeHandle` values containing `../` sequences in the `subDir` field. During deletion or cleanup operations, the driver may traverse outside the intended managed path and delete or modify unintended directories on the backing NFS server. The issue is tracked as **CVE-2026-3864** and carries a **CVSS 6.5** rating, with impact focused on integrity and availability rather than confidentiality. Affected deployments are those running **CSI Driver for NFS versions prior to `v4.13.1`** while allowing non-administrative or otherwise untrusted users to create PersistentVolumes that reference the NFS CSI driver. Kubernetes guidance says organizations should upgrade to **`v4.13.1` or later**, restrict PersistentVolume creation to trusted administrators, inspect `volumeHandle` values for traversal strings such as `../`, and review controller logs for unexpected directory operations such as references to paths escaping the intended export directory. This is a substantive vulnerability disclosure, not promotional or generic content.
1 months ago
AWS Research and Engineering Studio Flaws Enable Root Command Execution and AWS Privilege Escalation
AWS disclosed two high-severity vulnerabilities in **Research and Engineering Studio (RES)** that affect releases from `2025.03` through versions prior to `2026.03`. The first, **`CVE-2026-5707`**, is a `CWE-78` command injection flaw in virtual desktop session name handling that could let a remote authenticated attacker execute arbitrary commands as **root** on a virtual desktop host by supplying a crafted session name. The issue carries a CVSS v3.1 rating of `AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`, reflecting high impact across confidentiality, integrity, and availability. AWS also disclosed **`CVE-2026-5708`**, a `CWE-915` privilege-escalation flaw in the RES `CreateSession` API caused by improper control of user-modifiable attributes. An authenticated attacker could use a crafted API request to escalate privileges, assume the virtual desktop host instance profile permissions, and access AWS resources and services. AWS directed customers to upgrade to **RES `2026.03`** or apply the vendor mitigation patch, with details published through an AWS security bulletin, a GitHub issue, and the RES `2026.03` release notes.
2 weeks ago