GHSA-V63M-X9R9-8GQP
Vulnerability from github – Published: 2025-03-21 17:43 – Updated: 2025-10-14 21:58Summary
The AWS Cloud Development Kit (AWS CDK) [1] is an open-source software development framework for defining cloud infrastructure in code and provisioning it through AWS CloudFormation. The AWS CDK CLI [2] is a command line tool for interacting with CDK applications. Customers can use the CDK CLI to create, manage, and deploy their AWS CDK projects.
An issue exists in the AWS CDK CLI where, under certain conditions, AWS credentials may be returned in the console output. Plugins that return an expirationproperty in the credentials object are affected by this issue. Plugins that omit the expiration property are not affected.
Impact
When customers run AWS CDK CLI commands with credential plugins and configure those plugins to return temporary credentials by including an expiration property, the AWS credentials retrieved by the plugin may be returned in the console output. Any user with access where the CDK CLI was ran would have access to this output.
The following are examples of configuring a custom credential plugin:
Via command line option:
cdk deploy --plugin /path/to/plugin
Via configuration file [3]:
{
"plugin": "/path/to/plugin"
}
Plugins that return an expiration property in the credentials object, such as the following example, are affected:
return {
accessKeyId: '<access-key>',
secretAccessKey: '<secret-access-key>',
sessionToken: '<session-token>',
expiration: <date>,
};
The expiration property indicates that the provided credentials are temporary.
Please refer to our "AWS CDK CLI Library" guide for more information about custom credential plugins [4].
Impacted versions: >=2.172.0 and <2.178.2
Patches
The issue has been addressed in version 2.178.2 [5]. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes.
Workarounds
If you are unable to upgrade to version 2.178.2 or later, you can downgrade to version 2.171.1. If you are unable to downgrade, but have access to the code of the credential plugin you use, you can remove the expiration property from the object returned by the plugin.
For example, change the code from returning this:
return {
accessKeyId: assumeRoleOutput.Credentials.AccessKeyId,
secretAccessKey: assumeRoleOutput.Credentials.SecretAccessKey,
sessionToken: assumeRoleOutput.Credentials.SessionToken,
// Expiration indicates to the CLI that this is temporary
expiration: assumeRoleOutput.Credentials.Expiration,
};
To return this:
return {
accessKeyId: assumeRoleOutput.Credentials.AccessKeyId,
secretAccessKey: assumeRoleOutput.Credentials.SecretAccessKey,
sessionToken: assumeRoleOutput.Credentials.SessionToken,
};
Note that this will prevent the CDK CLI from refreshing the credentials when needed, and may cause your workflow to fail on an expired credentials error.
References
[1] https://docs.aws.amazon.com/cdk/v2/guide/home.html
[2] https://docs.aws.amazon.com/cdk/v2/guide/cli.html
[3] https://docs.aws.amazon.com/cdk/v2/guide/cli.html#cli-config
[4] https://www.npmjs.com/package/@aws-cdk/cli-plugin-contract
[5] https://github.com/aws/aws-cdk/releases/tag/v2.178.2
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "aws-cdk"
},
"ranges": [
{
"events": [
{
"introduced": "2.172.0"
},
{
"fixed": "2.178.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "cdk"
},
"ranges": [
{
"events": [
{
"introduced": "2.172.0"
},
{
"fixed": "2.178.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-2598"
],
"database_specific": {
"cwe_ids": [
"CWE-497"
],
"github_reviewed": true,
"github_reviewed_at": "2025-03-21T17:43:09Z",
"nvd_published_at": "2025-03-21T15:15:43Z",
"severity": "MODERATE"
},
"details": "## Summary\n\nThe AWS Cloud Development Kit (AWS CDK) [1] is an open-source software development framework for defining cloud infrastructure in code and provisioning it through AWS CloudFormation. The AWS CDK CLI [2] is a command line tool for interacting with CDK applications. Customers can use the CDK CLI to create, manage, and deploy their AWS CDK projects. \n\nAn issue exists in the AWS CDK CLI where, under certain conditions, AWS credentials may be returned in the console output. Plugins that return an `expiration `property in the credentials object are affected by this issue. Plugins that omit the `expiration` property are not affected. \n\n## Impact\n\nWhen customers run AWS CDK CLI commands with credential plugins and configure those plugins to return temporary credentials by including an `expiration` property, the AWS credentials retrieved by the plugin may be returned in the console output. Any user with access where the CDK CLI was ran would have access to this output. \n\nThe following are examples of configuring a custom credential plugin: \n\n_Via command line option:_\n\n`cdk deploy --plugin /path/to/plugin`\n\n_Via configuration file [3]:_\n\n```json\n{\n \"plugin\": \"/path/to/plugin\"\n}\n```\n\nPlugins that return an `expiration` property in the credentials object, such as the following example, are affected:\n\n```console\nreturn {\n accessKeyId: \u0027\u003caccess-key\u003e\u0027,\n secretAccessKey: \u0027\u003csecret-access-key\u003e\u0027,\n sessionToken: \u0027\u003csession-token\u003e\u0027,\n expiration: \u003cdate\u003e,\n};\n```\n\nThe `expiration` property indicates that the provided credentials are temporary. \n\nPlease refer to our \"AWS CDK CLI Library\" guide for more information about custom credential plugins [4].\n\n## Impacted versions: \u003e=2.172.0 and \u003c2.178.2\n\n## Patches\n\nThe issue has been addressed in version 2.178.2 [5]. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes. \n\n## Workarounds\n\nIf you are unable to upgrade to version 2.178.2 or later, you can downgrade to version 2.171.1. If you are unable to downgrade, but have access to the code of the credential plugin you use, you can remove the `expiration` property from the object returned by the plugin.\n\nFor example, change the code from returning this:\n\n```javascript\nreturn {\n accessKeyId: assumeRoleOutput.Credentials.AccessKeyId,\n secretAccessKey: assumeRoleOutput.Credentials.SecretAccessKey,\n sessionToken: assumeRoleOutput.Credentials.SessionToken,\n\n // Expiration indicates to the CLI that this is temporary\n expiration: assumeRoleOutput.Credentials.Expiration,\n};\n```\n\nTo return this:\n\n```javascript\nreturn {\n accessKeyId: assumeRoleOutput.Credentials.AccessKeyId,\n secretAccessKey: assumeRoleOutput.Credentials.SecretAccessKey,\n sessionToken: assumeRoleOutput.Credentials.SessionToken,\n};\n```\n\nNote that this will prevent the CDK CLI from refreshing the credentials when needed, and may cause your workflow to fail on an expired credentials error. \n\n## References\n\n[1] https://docs.aws.amazon.com/cdk/v2/guide/home.html\n\n[2] https://docs.aws.amazon.com/cdk/v2/guide/cli.html\n\n[3] https://docs.aws.amazon.com/cdk/v2/guide/cli.html#cli-config\n\n[4] https://www.npmjs.com/package/@aws-cdk/cli-plugin-contract\n\n[5] https://github.com/aws/aws-cdk/releases/tag/v2.178.2",
"id": "GHSA-v63m-x9r9-8gqp",
"modified": "2025-10-14T21:58:44Z",
"published": "2025-03-21T17:43:09Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/aws/aws-cdk/security/advisories/GHSA-v63m-x9r9-8gqp"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2598"
},
{
"type": "WEB",
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2025-005"
},
{
"type": "PACKAGE",
"url": "https://github.com/aws/aws-cdk"
},
{
"type": "WEB",
"url": "https://github.com/aws/aws-cdk/releases/tag/v2.178.2"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "AWS CDK CLI prints AWS credentials retrieved by custom credential plugins"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.