Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

AWS Q Developer Extension Vulnerability: Amazon's AI Agent Exposed to Prompt Injection and Remote Code Execution


Amazon Web Services (AWS) has fixed vulnerabilities in its Amazon Q Developer extension, which allow attackers to exploit prompt injection and remote code execution. The company's lack of transparency in addressing these issues has raised concerns among researchers and users alike.

  • Amazon Web Services (AWS) has fixed vulnerabilities in its Amazon Q Developer extension, which allows attackers to exploit prompt injection and remote code execution.
  • The issue lies in the internal permission model of the extension, which can categorize commands as "read-only" despite their potential for data exfiltration.
  • Remote code execution (RCE) vulnerabilities allow attackers to launch arbitrary commands on the host machine.
  • AWS has acknowledged the vulnerabilities and made enhancements to version 1.24.0 of the Amazon Q Developer Extension for VS Code.
  • The company recommends following security best practices, but lacks transparency about security fixes.



  • Amazon Web Services (AWS) has quietly fixed a couple of security issues in its Amazon Q Developer extension, which is used as an AI coding agent. The vulnerabilities discovered by security researcher Johann Rehberger allow attackers to exploit prompt injection and remote code execution on the developer's machine, potentially leading to data theft and unauthorized access.

    The issue with the AWS Q Developer extension lies in its internal permission model, which categorizes certain commands as "read-only" despite their potential for data exfiltration via DNS requests. Rehberger demonstrated this vulnerability by crafting a malicious prompt that read a .env file from the developer's machine, thereby dumping sensitive information such as an API key.

    Moreover, the extension is also vulnerable to remote code execution (RCE), which allows attackers to launch arbitrary commands on the host machine. This was achieved through indirect prompt injection, where the AI agent was tricked into changing its own security configuration or adding a malicious MCP server on the fly.

    AWS has acknowledged these vulnerabilities and made enhancements to the underlying language server as part of the Amazon Q Developer Extension for VS Code, with version 1.24.0. The company recommends that users follow security best practices to avoid executing deliberately malicious code, despite not considering the prompt injection or RCE vulnerabilities as traditional vulnerabilities in the same way that executing maliciously crafted code is.

    Rehberger expressed his belief that AWS should be more transparent about security fixes for its products, particularly in light of his own research. He pointed out that while Amazon has fixed all reported vulnerabilities, the company has not issued a public advisory or CVE (Common Vulnerabilities and Exposures) to inform customers about the patches.

    In contrast, other companies such as Anthropic and Microsoft have taken steps to address similar issues with greater transparency. Rehberger noted that this lack of transparency is particularly concerning given the potential for agents like Amazon Q Developer to change their own security configuration or controls, which can have significant implications for user security.

    In conclusion, the discovery of vulnerabilities in the AWS Q Developer extension highlights concerns over AI agent security and the importance of transparency in addressing such issues. As AI technology continues to advance and become more integrated into various products and services, it is crucial that companies prioritize user security and provide clear guidance on addressing emerging threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/AWS-Q-Developer-Extension-Vulnerability-Amazons-AI-Agent-Exposed-to-Prompt-Injection-and-Remote-Code-Execution-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2025/08/20/amazon_quietly_fixed_q_developer_flaws/

  • https://www.msn.com/en-us/news/technology/amazon-quietly-fixed-q-developer-flaws-that-made-ai-agent-vulnerable-to-prompt-injection-rce/ar-AA1KTSjF

  • https://www.techspot.com/news/108825-amazon-ai-coding-assistant-exposed-nearly-1-million.html


  • Published: Wed Aug 20 17:02:03 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us