Impact
The vulnerability is an improper protection of alternate path in the no‑access and workdir features of the AWS API MCP Server, identified as CWE‑424. It allows a bypass of intended file access restrictions, exposing arbitrary local file contents to the MCP client application context. The CVSS score of 6.8 indicates a moderate severity with a primary impact on confidentiality.
Affected Systems
Affected systems are AWS API MCP Server versions that are greater than or equal to 0.2.14 and less than 1.3.9, available on all platforms. The product is provided by Amazon Web Services.
Risk and Exploitability
The moderate CVSS score and lack of an EPSS rating mean the risk level is uncertain but significant if exploited. The vulnerability is not listed in the CISA KEV catalog. Exploitation appears to require some form of client interaction or local access to the MCP client application, as no explicit remote exploitation vector is documented. Attackers could leverage the path bypass to read sensitive local files if they have sufficient access to the MCP client context.
OpenCVE Enrichment
Github GHSA