By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
Computing

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

News Room
Last updated: 2026/01/15 at 3:47 PM
News Room Published 15 January 2026
Share
AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
SHARE

A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider’s own GitHub repositories, including its AWS JavaScript SDK, putting every AWS environment at risk.

The vulnerability has been codenamed CodeBreach by cloud security company Wiz. The issue was fixed by AWS in September 2025 following responsible disclosure on August 25, 2025.

“By exploiting CodeBreach, attackers could have injected malicious code to launch a platform-wide compromise, potentially affecting not just the countless applications depending on the SDK, but the Console itself, threatening every AWS account,” researchers Yuval Avrahami and Nir Ohfeld said in a report shared with The Hacker News.

The flaw, Wiz noted, is the result of a weakness in the continuous integration (CI) pipelines that could have enabled unauthenticated attackers to breach the build environment, leak privileged credentials like GitHub admin tokens, and then use them to push malicious changes to the compromised repository – creating a pathway for supply chain attacks.

Put differently, the issue undermines webhook filters introduced by AWS to ensure that only certain events trigger a CI build. For example, AWS CodeBuild can be configured such that a build is triggered only when code changes are committed to a specific branch or when a GitHub or GitHub Enterprise Server account ID (aka ACTOR_ID or actor ID) matches the regular expression pattern. These filters serve to secure against untrusted pull requests.

Cybersecurity

The misconfiguration impacted the following AWS-managed open source GitHub repositories, which are configured to run builds on pull requests –

  • aws-sdk-js-v3
  • aws-lc
  • amazon-corretto-crypto-provider
  • awslabs/open-data-registry

The four projects, which implemented an ACTOR_ID filter, suffered from a “fatal flaw” in that they failed to include two characters to ensure – namely the start ^ and end $ anchors – necessary to yield an exact regular expression (regex) match. Instead, the regex pattern allowed any GitHub user ID that was a superstring of an approved ID (e.g., 755743) to bypass the filter and trigger the build.

Because GitHub assigns numeric user IDs sequentially, Wiz said it was able to predict that the new user IDs (currently 9-digits long) would “eclipse” a trusted maintainer’s six-digit ID approximately every five days. This insight, coupled with the use of GitHub Apps to automate app creation (which, in turn, creates a corresponding bot user), made it possible to generate a target ID (e.g., 226755743) by triggering hundreds of new bot user registrations.

Armed with the actor ID, an attacker can now trigger a build and obtain the GitHub credentials of the aws-sdk-js-v3 CodeBuild project, a Personal Access Token (PAT) belonging to the aws-sdk-js-automation user, which has full admin privileges over the repository.

The attacker can weaponize this elevated access to push code directly to the main branch, approve pull requests, and exfiltrate repository secrets, eventually setting the stage for supply chain attacks.

“The above repositories’ configured regular expressions for AWS CodeBuild webhook filters intended to limit trusted actor IDs were insufficient, allowing a predictably acquired actor ID to gain administrative permissions for the affected repositories,” AWS said in an advisory released today.

“We can confirm these were project-specific misconfigurations in webhook actor ID filters for these repositories and not an issue in the CodeBuild service itself.”

Amazon also said it remediated the identified issues, along with implementing additional mitigations, such as credential rotations and steps to secure the build processes that contain GitHub tokens or any other credentials in memory. It further emphasized that it found no evidence of CodeBreach having been exploited in the wild.

To mitigate such risks, it’s essential that untrusted contributions does not trigger privileged CI/CD pipelines by enabling the new Pull Request Comment Approval build gate, use CodeBuild-hosted runners to manage build triggers via GitHub workflows, ensure regex patterns in webhook filters are anchored, generate a unique PAT for each CodeBuild project, limit the PAT’s permissions to the minimum required, and consider using a dedicated unprivileged GitHub account for CodeBuild integration.

Cybersecurity

“This vulnerability is a textbook example of why adversaries target CI/CD environments: a subtle, easily overlooked flaw that can be exploited for massive impact,” Wiz researchers noted. “This combination of complexity, untrusted data, and privileged credentials creates a perfect storm for high-impact breaches that require no prior access.”

This is not the first time CI/CD pipeline security has attracted scrutiny. Last year, research from Sysdig detailed how insecure GitHub Actions workflows associated with the pull_request_target trigger could be exploited to leak the privileged GITHUB_TOKEN and gain unauthorized access to dozens of open-source projects by using a single pull request from a fork.

A similar two-part analysis from Orca Security found insecure pull_request_target in projects from Google, Microsoft, NVIDIA, and other Fortune-500 companies that could have allowed attackers to run arbitrary code, exfiltrate sensitive secrets, and push malicious code or dependencies to trusted branches. The phenomenon has been dubbed pull_request_nightmare.

“By abusing misconfigured workflows triggered via pull_request_target, adversaries could escalate from an untrusted forked pull request into remote code execution (RCE) on GitHub-hosted or even self-hosted runners,” security researcher Roi Nisimi noted.

“GitHub Actions workflows that use the pull_request_target should never checkout untrusted code without an appropriate validation. Once they do, they are at risk of a full compromise.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Projector deal: XGIMI Elfin Flip Plus hits new record-low price! Projector deal: XGIMI Elfin Flip Plus hits new record-low price!
Next Article Apple Adjusts Trade-In Values for iPhones, Macs, and More Apple Adjusts Trade-In Values for iPhones, Macs, and More
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Verizon 2026 outage was worse than most, say experts
Verizon 2026 outage was worse than most, say experts
Software
20+ high-converting fashion affiliate programs for creators
20+ high-converting fashion affiliate programs for creators
Computing
There's a new Apple monitor imminent, but what it will be is anybody's guess
There's a new Apple monitor imminent, but what it will be is anybody's guess
News
Elon Musk’s X bans ‘InfoFi’ crypto projects for posting AI slop and reply spam
Elon Musk’s X bans ‘InfoFi’ crypto projects for posting AI slop and reply spam
News

You Might also Like

20+ high-converting fashion affiliate programs for creators
Computing

20+ high-converting fashion affiliate programs for creators

2 Min Read
The Elephant in the Room: Why This AST Translation Must Be Code-Generated | HackerNoon
Computing

The Elephant in the Room: Why This AST Translation Must Be Code-Generated | HackerNoon

15 Min Read
EndeavourOS 2026.01.12 Released With Linux 6.18 LTS Kernel, NVIDIA Open Modules
Computing

EndeavourOS 2026.01.12 Released With Linux 6.18 LTS Kernel, NVIDIA Open Modules

1 Min Read
Chinese female-targeted game developer Papergames earned alt=
Computing

Chinese female-targeted game developer Papergames earned $0.95 billion revenue in 2024 · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?