Skip to main content
Mallory

Critical AWS Ops Wheel Flaws Enable Admin Takeover via JWT Forgery and Cognito Abuse

identity-authentication-vulnerabilitycloud-service-vulnerabilitywidely-deployed-product-advisory
Updated April 24, 2026 at 07:04 PM2 sources
Share:
Critical AWS Ops Wheel Flaws Enable Admin Takeover via JWT Forgery and Cognito Abuse

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

AWS disclosed two severe vulnerabilities in AWS Ops Wheel that can let attackers seize administrative control of deployments and manipulate tenant data. CVE-2026-6911 is an authentication bypass caused by missing JWT signature verification at the API Gateway endpoint, allowing unauthenticated attackers to forge tokens and gain unintended admin access. AWS said successful exploitation could let attackers read, modify, and delete application data across tenants and manage Cognito user accounts in the deployment's User Pool; the flaw is tracked as CWE-347 and carries a critical CVSS v3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H rating.

AWS also fixed CVE-2026-6912, a privilege-escalation issue in Ops Wheel's Cognito User Pool configuration that let authenticated users promote themselves to deployment administrator by setting the custom:deployment_admin attribute through the UpdateUserAttributes API. The bug, classified as CWE-915, exposed the same ability to manage Cognito user accounts and carried a high-severity CVSS v3.1 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H score. AWS directed customers to redeploy from the updated repository and apply the fixes to any forked or derivative code, with patches referenced in an AWS security bulletin, a GitHub pull request, and a GitHub security advisory.

Timeline

  1. Apr 24, 2026

    CVE-2026-6911 and CVE-2026-6912 are publicly recorded

    On April 24, 2026, CVE records were published for two AWS Ops Wheel vulnerabilities: CVE-2026-6911, an authentication bypass via missing JWT signature verification, and CVE-2026-6912, a privilege-escalation flaw involving a self-writable Cognito custom attribute. The disclosures described potential impact including cross-tenant data access and Cognito user account management.

  2. Apr 24, 2026

    AWS fixes two privilege flaws in AWS Ops Wheel before pull request #165

    AWS released updated AWS Ops Wheel code addressing two issues: missing JWT signature verification that allowed unauthenticated admin access, and a Cognito custom attribute misconfiguration that allowed authenticated users to escalate to deployment administrator. AWS advised customers to redeploy from the updated repository and patch any forked or derivative code.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

AWS Research and Engineering Studio Flaws Enable Root Command Execution and AWS Privilege Escalation

AWS Research and Engineering Studio Flaws Enable Root Command Execution and AWS Privilege Escalation

AWS disclosed two high-severity vulnerabilities in **Research and Engineering Studio (RES)** that affect releases from `2025.03` through versions prior to `2026.03`. The first, **`CVE-2026-5707`**, is a `CWE-78` command injection flaw in virtual desktop session name handling that could let a remote authenticated attacker execute arbitrary commands as **root** on a virtual desktop host by supplying a crafted session name. The issue carries a CVSS v3.1 rating of `AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`, reflecting high impact across confidentiality, integrity, and availability. AWS also disclosed **`CVE-2026-5708`**, a `CWE-915` privilege-escalation flaw in the RES `CreateSession` API caused by improper control of user-modifiable attributes. An authenticated attacker could use a crafted API request to escalate privileges, assume the virtual desktop host instance profile permissions, and access AWS resources and services. AWS directed customers to upgrade to **RES `2026.03`** or apply the vendor mitigation patch, with details published through an AWS security bulletin, a GitHub issue, and the RES `2026.03` release notes.

2 weeks ago
Windows Admin Center flaws exposed hybrid Azure and on-prem environments to takeover

Windows Admin Center flaws exposed hybrid Azure and on-prem environments to takeover

Researchers disclosed multiple vulnerabilities in Microsoft **Windows Admin Center (WAC)** that could let attackers compromise hybrid environments spanning **Azure** and on-premises infrastructure. Cymulate said one exploit chain enabled **unauthenticated, one-click remote code execution** when a victim visited a malicious URL, combining response-based cross-site scripting, insecure redirect handling, and insecure credential storage to steal credentials, run arbitrary **PowerShell** commands, and capture Azure tokens. The issues affected both Azure-integrated and on-prem deployments, with the most severe risk falling on self-managed on-prem WAC instances that could be used to execute commands on managed servers and pivot into cloud resources. Additional flaws presented at Black Hat Asia were tracked as **`CVE-2025-64669`**, **`CVE-2026-20965`**, **`CVE-2026-23660`**, and **`CVE-2026-32196`**, including a non-write-protected on-prem WAC directory and weaknesses in proof-of-possession token validation that could allow token reuse or forgery and takeover of tenant VMs. Microsoft said Azure-managed instances received server-side fixes after responsible disclosure, and the company has patched the broader set of vulnerabilities with no evidence of active exploitation. Researchers urged organizations to update on-prem WAC immediately, remove outdated exposed instances, and treat both cloud and on-prem management planes as **tier-zero assets** because WAC can serve as a bidirectional path between the two environments.

1 weeks ago
AWS CodeBuild Webhook Filter Misconfiguration Enabled Potential Takeover of AWS GitHub Repositories

AWS CodeBuild Webhook Filter Misconfiguration Enabled Potential Takeover of AWS GitHub Repositories

Security researchers at **Wiz** disclosed a critical **AWS CodeBuild** misconfiguration (dubbed **CodeBreach**) that could have enabled unauthenticated attackers to trigger CI builds from untrusted pull requests, access the build environment, and exfiltrate privileged credentials such as **GitHub admin tokens**. With those tokens, an attacker could have pushed malicious commits into AWS-managed open-source repositories—creating a high-impact **software supply chain** pathway that could have cascaded into widespread compromise, including risk to dependencies like the **AWS JavaScript SDK** and potentially components used by the **AWS Console** itself. AWS was notified on **2025-08-25** and remediated the issue in **September 2025**. The root cause was described as a weakness in CodeBuild’s webhook filtering logic intended to restrict which events/users can trigger builds; affected repositories used an `ACTOR_ID` regex filter that omitted the `^` and `$` anchors, allowing bypass of the intended match constraints. Reported impacted AWS-managed GitHub repositories included `aws-sdk-js-v3`, `aws-lc`, `amazon-corretto-crypto-provider`, and `awslabs/open-data-registry`, all configured to run builds on pull requests. Separate reporting on abuse of **self-hosted GitHub Actions runners** as backdoors (including the **Shai-Hulud** worm technique) is related at a thematic CI/CD level but does not describe the CodeBuild misconfiguration or the AWS repository takeover scenario.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.