Skip to content

GHSA-6475-r3vj-m8vf (LOW): detected in Lambda Docker Images. #375

@the-lambda-watchdog

Description

@the-lambda-watchdog

CVE Details

CVE ID Severity Affected Package Installed Version Fixed Version Date Published Date of Scan
GHSA-6475-r3vj-m8vf LOW @smithy/config-resolver 4.2.2 4.4.0 2026-01-08T21:52:45Z 2026-01-09T10:18:21.10426023Z

Affected Docker Images

Image Name SHA
public.ecr.aws/lambda/nodejs:latest public.ecr.aws/lambda/nodejs@sha256:7c0f198924ea29e201d4d44ffc8f97c6ec7be3bf7b91c848939e5c2eeff6d43c
public.ecr.aws/lambda/nodejs:24 public.ecr.aws/lambda/nodejs@sha256:9d7dcad6de2f4bb85f65af1d70d14c936c671b0541a49566a2b5d3db51195b03
public.ecr.aws/lambda/nodejs:22 public.ecr.aws/lambda/nodejs@sha256:7c0f198924ea29e201d4d44ffc8f97c6ec7be3bf7b91c848939e5c2eeff6d43c
public.ecr.aws/lambda/nodejs:20 public.ecr.aws/lambda/nodejs@sha256:c9db858f1061d1662d081a7d3fe30e1c9cf8dd4eb658f60ab34cc8ebe8f939a0

Description

CVSSv3.1 Rating: 3.7 (LOW)

Summary

This notification is related to the use of specific values for the region input field when calling AWS services. An actor with access to the environment in which the SDK is used could set the region input field to an invalid value.

A defense-in-depth enhancement has been implemented in the AWS SDK for JavaScript v3 (versions 3.723.0 and later). This enhancement validates that a region used to construct an endpoint URL is a valid host label. The change was released on November 15, 2025. This advisory is informational to help customers understand their responsibilities regarding configuration security.

Impact
Customer applications could be configured to improperly route AWS API calls to non-existent or non-AWS hosts. While the SDK was functioning as designed, additional safeguards have been added to support secure customer implementations.

Impacted versions: @smithy/config-resolver <4.4.0

Patches

On November 15, 2025, an enhancement was made to the AWS SDK for JavaScript v3 (versions 3.723.0 and later) release, which validates the formatting of a region, providing additional safeguards. A feature enhancement was implemented in @smithy/config-resolver v4.4.0. This enhancement provides additional configuration validation safeguards but does not address a security vulnerability.

Workarounds
No workarounds are needed, but as always you should ensure that your application is following security best practices:

  • Implement proper input validation in your application code
  • Update to the latest AWS SDK for Javascript v3 release on a regular basis
  • Follow AWS security best practices [1] for SDK configuration

Resources
Contact AWS Security via the vulnerability reporting page or email aws-security@amazon.com.

Acknowledgement
AWS Security thanks Guy Arazi for bringing these customer security considerations to our attention through the coordinated disclosure process.

[1] https://docs.aws.amazon.com/sdk-for-javascript/v3/developer-guide/security.html


Remediation Steps

  • Update the affected package @smithy/config-resolver from version 4.2.2 to 4.4.0.

About this issue

  • This issue may not contain all the information about the CVE nor the images it affects.
  • This issue will not be updated with new information and the list of affected images may have changed since the creation of this issue.
  • For more, visit Lambda Watchdog.
  • This issue was created automatically by Lambda Watchdog.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions