Description
aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of the allowed commands list. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the MCP server. Was ZDI-CAN-27969.
Published: 2026-04-11
Score: 9.8 Critical
EPSS: 1.7% Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The reported flaw lies in the handling of the command whitelist within aws-mcp-server. An attacker can supply an arbitrary string that bypasses validation and is directly passed to a system call. This allows execution of arbitrary code with the privileges of the MCP server, constituting a remote code execution vulnerability.

Affected Systems

The affected product is aws-mcp-server. No explicit version information is provided in the CVE entry, so all installations of aws-mcp-server that have not applied a vendor-supplied fix are considered vulnerable. The flaw impacts deployments that rely on the command execution feature without additional safeguards.

Risk and Exploitability

The vulnerability does not require authentication and can be triggered from any network location that can reach the MCP server, making the attack surface large. The high CVSS score of 9.8 reflects the potential for complete system compromise. Because there is no EPSS score and the issue is not listed in the CISA KEV catalog, the chance of public exploitation remains uncertain, but the combination of high severity and unauthenticated access indicates a high-risk threat.

Generated by OpenCVE AI on April 11, 2026 at 02:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor's patch for aws-mcp-server that addresses the command injection flaw.
  • If no patch is yet available, configure the MCP server to use a strict whitelist of allowed commands and reject everything else.
  • Restrict network access to the MCP server with firewall rules or access control lists to limit reachability.
  • Monitor logs for attempts to invoke the command execution functionality and investigate suspicious activity.
  • Ensure any remaining user-supplied command strings are adequately sanitized before being passed to the operating system.

Generated by OpenCVE AI on April 11, 2026 at 02:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fgmx-xfp3-w28p aws-mcp has a Command Injection Remote Code Execution Vulnerability
History

Mon, 13 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Aws
Aws aws-mcp-server
Vendors & Products Aws
Aws aws-mcp-server

Sat, 11 Apr 2026 01:00:00 +0000

Type Values Removed Values Added
Description aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the allowed commands list. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the MCP server. Was ZDI-CAN-27969.
Title aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Aws Aws-mcp-server
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-04-13T17:30:38.053Z

Reserved: 2026-03-27T18:10:12.060Z

Link: CVE-2026-5059

cve-icon Vulnrichment

Updated: 2026-04-13T17:30:33.975Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-11T01:16:18.293

Modified: 2026-04-13T15:01:43.663

Link: CVE-2026-5059

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:57:03Z

Weaknesses