Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @smithy/config-resolver
  4. ›
  5. GHSA-6475-r3vj-m8vf

GHSA-6475-r3vj-m8vf: AWS SDK for JavaScript v3 adopted defense in depth enhancement for region parameter value

January 8, 2026

CVSSv3.1 Rating: 3.7 (LOW)

Summary

This notification is related to the use of specific values for the region input field when calling AWS services. An actor with access to the environment in which the SDK is used could set the region input field to an invalid value.

A defense-in-depth enhancement has been implemented in the AWS SDK for JavaScript v3 (versions 3.723.0 and later). This enhancement validates that a region used to construct an endpoint URL is a valid host label. The change was released on November 15, 2025. This advisory is informational to help customers understand their responsibilities regarding configuration security.

Impact Customer applications could be configured to improperly route AWS API calls to non-existent or non-AWS hosts. While the SDK was functioning as designed, additional safeguards have been added to support secure customer implementations.

Impacted versions: @smithy/config-resolver <4.4.0

Patches

On November 15, 2025, an enhancement was made to the AWS SDK for JavaScript v3 (versions 3.723.0 and later) release, which validates the formatting of a region, providing additional safeguards. A feature enhancement was implemented in @smithy/config-resolver v4.4.0. This enhancement provides additional configuration validation safeguards but does not address a security vulnerability.

Workarounds No workarounds are needed, but as always you should ensure that your application is following security best practices:

  • Implement proper input validation in your application code
  • Update to the latest AWS SDK for Javascript v3 release on a regular basis
  • Follow AWS security best practices [1] for SDK configuration

Resources Contact AWS Security via the vulnerability reporting page or email aws-security@amazon.com.

Acknowledgement AWS Security thanks Guy Arazi for bringing these customer security considerations to our attention through the coordinated disclosure process.

[1] https://docs.aws.amazon.com/sdk-for-javascript/v3/developer-guide/security.html

References

  • docs.aws.amazon.com/sdk-for-javascript/v3/developer-guide/security.html
  • github.com/advisories/GHSA-6475-r3vj-m8vf
  • github.com/aws/aws-sdk-js-v3
  • github.com/aws/aws-sdk-js-v3/security/advisories/GHSA-6475-r3vj-m8vf
  • github.com/aws/aws-sdk-js/security/advisories/GHSA-j965-2qgj-vjmq

Code Behaviors & Features

Detect and mitigate GHSA-6475-r3vj-m8vf with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.4.0

Fixed versions

  • 4.4.0

Solution

Upgrade to version 4.4.0 or above.

Impact 3.7 LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

npm/@smithy/config-resolver/GHSA-6475-r3vj-m8vf.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:45 +0000.