AWS SAM CLI Vulnerabilities: Docker Drama and the Symlink Saga!

AWS SAM CLI users, time to upgrade! The latest version fixes two vulnerabilities allowing access to restricted files via symlinks. Avoid accidental snooping in your own code by keeping your AWS SAM CLI up to date—because who knew symlinks could double as sneaky spies?

Pro Dashboard

Hot Take:

Oh, AWS, we trusted you! But now you’ve given hackers a free pass to rummage through our closets and steal our best secrets. Time to upgrade that SAM CLI before it turns into a real-life game of “Who Wants to Be an Intruder?”

Key Points:

  • AWS SAM CLI has two security vulnerabilities, CVE-2025-3047 and CVE-2025-3048.
  • CVE-2025-3047 allows unauthorized access to privileged files via symlinks in Docker environments.
  • CVE-2025-3048 exposes sensitive symlink content in the local workspace cache post-build.
  • The vulnerabilities affect AWS SAM CLI versions up to v1.133.0.
  • Users are urged to upgrade to versions 1.133.0 and 1.134.0 for fixes.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?