Impact
The reported flaw lies in the handling of the command whitelist within aws-mcp-server. An attacker can supply an arbitrary string that bypasses validation and is directly passed to a system call. This allows execution of arbitrary code with the privileges of the MCP server, constituting a remote code execution vulnerability.
Affected Systems
The affected product is aws-mcp-server. No explicit version information is provided in the CVE entry, so all installations of aws-mcp-server that have not applied a vendor-supplied fix are considered vulnerable. The flaw impacts deployments that rely on the command execution feature without additional safeguards.
Risk and Exploitability
The vulnerability does not require authentication and can be triggered from any network location that can reach the MCP server, making the attack surface large. The high CVSS score of 9.8 reflects the potential for complete system compromise. Because there is no EPSS score and the issue is not listed in the CISA KEV catalog, the chance of public exploitation remains uncertain, but the combination of high severity and unauthenticated access indicates a high-risk threat.
OpenCVE Enrichment
Github GHSA