All boto3 CVEs — Complete Vulnerability History

Last updated: April 1, 2026 · Data: OSV Database

boto3 is the AWS SDK for Python. Its CVEs are rare — most AWS-related Python security issues come from misconfiguration rather than boto3 vulnerabilities.

PyPI 100M+ weekly downloads 1 CVE total

Full CVE history

CVEYearSeverityDescriptionFix
CVE-2023-340482023HIGHCredential exposure via debug loggingFixed 1.28.0

Current safe version: 1.34.69

# Before
boto3==1.26.0
# After
boto3==1.34.69

Then run: pip install -r requirements.txt

Why boto3 CVEs are almost always transitive

boto3 itself has a clean CVE record — most "boto3 vulnerabilities" flagged by scanners are actually in its dependencies: botocore, urllib3, or requests. When npm audit or pip-audit flags boto3, check the full dependency path first.

# See the full dependency tree for boto3
pip show boto3 | grep Requires

# Check which specific sub-package is flagged
pip-audit --requirement requirements.txt --format json | python3 -m json.tool | grep -A5 "name"

boto3 version history — security relevant releases

Version Key change Notes
1.34.x+Updated urllib3 dependencyResolves CVE-2023-43804
1.26.x+Updated requests dependencyResolves CVE-2023-32681
Any versionPinned old urllib3/requestsMay be vulnerable via transitive deps

Fix transitive boto3 vulnerabilities

# Pin safe versions of boto3's dependencies directly
# Add to requirements.txt:
urllib3>=2.0.7
requests>=2.31.0
botocore>=1.34.0
boto3>=1.34.0

# Then update
pip install -r requirements.txt --upgrade

IAM credential exposure — the real boto3 security risk

The more significant security concern with boto3 is credential handling, not CVEs. Hardcoded AWS keys in source code are the #1 boto3 security incident. boto3 reads credentials from environment variables, ~/.aws/credentials, or IAM roles — never hardcode them.

# Never do this
s3 = boto3.client('s3', aws_access_key_id='AKIA...', aws_secret_access_key='...')

# Use environment variables or IAM roles instead
s3 = boto3.client('s3')  # reads from environment or ~/.aws/credentials

Paste your manifest — get a fixed version with all CVEs patched in seconds.

Open PackageFix →

Free · No signup · No CLI · Runs in your browser

Common questions

Is boto3 safe for production AWS operations?
boto3 has a very clean CVE history. The main risk with AWS SDK usage is credential management — never hardcode credentials, use IAM roles and environment variables.

Related