An overly-permissive IAM trust policy in the Harmonix on AWS framework may allow IAM principals in the same AWS account to escalate privileges via role assumption. The sample code for the EKS environment provisioning role is configured to trust the account root principal, which may enable any IAM principal in the same AWS account with sts:AssumeRole permissions to assume the role with administrative privileges.
We recommend customers upgrade to Harmonix on AWS v0.4.2 or later if you have deployed the framework using versions v0.3.0 through v0.4.1.
References
| Link | Resource |
|---|---|
| https://aws.amazon.com/security/security-bulletins/AWS-2025-031/ | Patch Vendor Advisory |
| https://github.com/awslabs/harmonix/pull/189 | Issue Tracking |
| https://github.com/awslabs/harmonix/security/advisories/GHSA-qm86-gqrq-mqcw | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-12-15 20:15
Updated : 2026-01-30 17:02
NVD link : CVE-2025-14503
Mitre link : CVE-2025-14503
CVE.ORG link : CVE-2025-14503
JSON object : View
Products Affected
amazon
- harmonix
CWE
CWE-266
Incorrect Privilege Assignment
