GHSA-6475-r3vj-m8vf

Suggest an improvement
Source
https://github.com/advisories/GHSA-6475-r3vj-m8vf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-6475-r3vj-m8vf/GHSA-6475-r3vj-m8vf.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-6475-r3vj-m8vf
Downstream
Published
2026-01-08T21:52:45Z
Modified
2026-01-08T22:01:57.503339Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
AWS SDK for JavaScript v3 adopted defense in depth enhancement for region parameter value
Details

CVSSv3.1 Rating: 3.7 (LOW)

Summary

This notification is related to the use of specific values for the region input field when calling AWS services. An actor with access to the environment in which the SDK is used could set the region input field to an invalid value.

A defense-in-depth enhancement has been implemented in the AWS SDK for JavaScript v3 (versions 3.723.0 and later). This enhancement validates that a region used to construct an endpoint URL is a valid host label. The change was released on November 15, 2025. This advisory is informational to help customers understand their responsibilities regarding configuration security.

Impact Customer applications could be configured to improperly route AWS API calls to non-existent or non-AWS hosts. While the SDK was functioning as designed, additional safeguards have been added to support secure customer implementations.

Impacted versions: @smithy/config-resolver <4.4.0

Patches

On November 15, 2025, an enhancement was made to the AWS SDK for JavaScript v3 (versions 3.723.0 and later) release, which validates the formatting of a region, providing additional safeguards. A feature enhancement was implemented in @smithy/config-resolver v4.4.0. This enhancement provides additional configuration validation safeguards but does not address a security vulnerability.

Workarounds No workarounds are needed, but as always you should ensure that your application is following security best practices: - Implement proper input validation in your application code - Update to the latest AWS SDK for Javascript v3 release on a regular basis - Follow AWS security best practices [1] for SDK configuration

Resources Contact AWS Security via the vulnerability reporting page or email aws-security@amazon.com.

Acknowledgement AWS Security thanks Guy Arazi for bringing these customer security considerations to our attention through the coordinated disclosure process.

[1] https://docs.aws.amazon.com/sdk-for-javascript/v3/developer-guide/security.html

Database specific
{
    "severity": "LOW",
    "github_reviewed_at": "2026-01-08T21:52:45Z",
    "github_reviewed": true,
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-20"
    ]
}
References

Affected packages

npm / @smithy/config-resolver

Package

Name
@smithy/config-resolver
View open source insights on deps.dev
Purl
pkg:npm/%40smithy/config-resolver

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0

Database specific

source

"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-6475-r3vj-m8vf/GHSA-6475-r3vj-m8vf.json"