Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.9

AWS EFS CSI Driver allows attackers to inject arbitrary mount options

CVE-2026-6437 GHSA-mph4-q2vm-w2pw
Summary

A security issue in the AWS EFS CSI Driver allows authenticated users to inject malicious options when creating a persistent volume. This could potentially lead to unauthorized access or data corruption. To fix this, update to the latest version of the driver (v3.0.1 or later) to prevent exploitation.

What to do
  • Update github.com kubernetes-sigs to version 1.7.8-0.20260416142831-51806c22c575.
Affected software
Ecosystem VendorProductAffected versions
go github.com kubernetes-sigs < 1.7.8-0.20260416142831-51806c22c575
Fix: upgrade to 1.7.8-0.20260416142831-51806c22c575
Original title
Amazon EFS CSI Driver has mount option injection via unsanitized volumeHandle and mounttargetip fields
Original description
### Summary
The Amazon EFS CSI Driver is a Container Storage Interface driver that allows Kubernetes clusters to use Amazon Elastic File System. An issue exists where, under certain circumstances, unsanitized values in the volumeHandle and mounttargetip fields are passed directly to the mount command, allowing injection of arbitrary mount options.

### Impact
An actor with PersistentVolume creation privileges can inject arbitrary mount options by appending comma-separated values to the Access Point ID in volumeHandle or to the mounttargetip volumeAttribute. The mount utility parses comma-separated values as separate options, causing the injected options to be applied to the filesystem mount without authorization.

Impacted versions: <= v3.0.0

### Patches
This issue has been addressed in Amazon EFS CSI Driver version v3.0.1. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes.

### Workarounds
Restrict PersistentVolume and StorageClass creation to cluster administrators using Kubernetes RBAC, preventing untrusted users from supplying arbitrary field values.

### References
If you have any questions or comments about this advisory, we ask that you contact AWS Security via our vulnerability reporting page or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue.

### Acknowledgement
We would like to thank Shaul Ben-Hai from Sentinel One for collaborating on this issue through the coordinated vulnerability disclosure process.
nvd CVSS3.1 6.5
nvd CVSS4.0 6.9
Vulnerability type
CWE-88
Published: 18 Apr 2026 · Updated: 18 Apr 2026 · First seen: 17 Apr 2026