Missing JWT signature verification in AWS Ops Wheel allows unauthenticated attackers to forge JWT tokens and gain unintended administrative access to the application, including the ability to read, modify, and delete all application data across tenants and manage Cognito user accounts within the deployment's User Pool, via a crafted JWT sent to the API Gateway endpoint. To remediate this issue, users should redeploy from the updated repository and ensure any forked or derivative code is patched to incorporate the new fixes.
History

Fri, 24 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description Missing JWT signature verification in AWS Ops Wheel allows unauthenticated attackers to forge JWT tokens and gain unintended administrative access to the application, including the ability to read, modify, and delete all application data across tenants and manage Cognito user accounts within the deployment's User Pool, via a crafted JWT sent to the API Gateway endpoint. To remediate this issue, users should redeploy from the updated repository and ensure any forked or derivative code is patched to incorporate the new fixes.
Title Authentication Bypass via Missing JWT Signature Verification in AWS Ops Wheel
First Time appeared Aws
Aws aws Ops Wheel
Weaknesses CWE-347
CPEs cpe:2.3:a:aws:aws_ops_wheel:*:*:*:*:*:*:*:*
Vendors & Products Aws
Aws aws Ops Wheel
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-04-24T16:13:28.829Z

Reserved: 2026-04-23T13:38:10.476Z

Link: CVE-2026-6911

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-24T17:16:22.220

Modified: 2026-04-24T17:56:41.280

Link: CVE-2026-6911

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.