CVE-2026-6437: Mount Option Injection in Amazon EFS CSI Driver
Vulnerability ID: CVE-2026-6437
CVSS Score: 6.5
Published: 2026-04-18
The Amazon EFS CSI Driver contains an argument injection vulnerability (CWE-88) in versions prior to v3.0.1. Unsanitized values in the volumeHandle and mounttargetip fields allow authenticated users with PersistentVolume creation permissions to inject arbitrary mount options.
TL;DR
Authenticated Kubernetes users can bypass mount restrictions by injecting arbitrary comma-separated mount options via unsanitized PersistentVolume fields in the AWS EFS CSI Driver.
Technical Details
- CWE ID: CWE-88: Argument Injection
- Attack Vector: Network
- CVSS v3.1 Score: 6.5 (Medium)
- EPSS Score: 0.00029 (8.06%)
- Privileges Required: High (PersistentVolume Creation)
- Exploit Status: Unexploited / PoC available
- CISA KEV: Not Listed
Affected Systems
- Amazon EFS CSI Driver (aws-efs-csi-driver) versions < 3.0.1
- Kubernetes clusters utilizing the vulnerable AWS EFS CSI driver
-
aws-efs-csi-driver: < 3.0.1 (Fixed in:
3.0.1)
Code Analysis
Commit: 51806c2
Fix argument injection in mount options by adding strict net.ParseIP validation to mounttargetip field.
Mitigation Strategies
- Upgrade the Amazon EFS CSI Driver daemonset to v3.0.1 or higher.
- Restrict Kubernetes RBAC permissions for PersistentVolume and StorageClass creation.
- Deploy OPA Gatekeeper or Kyverno policies to validate and sanitize volume attributes.
- Monitor Kubernetes audit logs for irregular characters in volume provisioning requests.
Remediation Steps:
- Identify the current version of the aws-efs-csi-driver deployed in the cluster.
- Review RBAC roles to ensure only cluster-admin equivalents can create PersistentVolumes.
- Apply the v3.0.1 (or latest) release manifests or update the corresponding Helm chart.
- Verify the daemonset rollout across all worker nodes is complete.
- Test volume provisioning to confirm the updated driver maintains operational functionality.
References
- NVD Detail: CVE-2026-6437
- AWS Security Bulletin 2026-016
- GitHub Security Advisory: GHSA-mph4-q2vm-w2pw
- Fix Commit 51806c22c5754bfbdeca6910f15571a07921b784
- Release v3.0.1
Read the full report for CVE-2026-6437 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)