CVE-2025-63604
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-18

Last updated on: 2025-12-31

Assigner: MITRE

Description
A code injection vulnerability exists in baryhuang/mcp-server-aws-resources-python 0.1.0 that allows remote code execution through insufficient input validation in the execute_query method. The vulnerability stems from the exposure of dangerous Python built-in functions (__import__, getattr, hasattr) in the execution namespace and the direct use of exec() to execute user-supplied code. An attacker can craft malicious queries to execute arbitrary Python code, leading to AWS credential theft (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY), file system access, environment variable disclosure, and potential system compromise. The vulnerability allows attackers to bypass intended security controls and gain unauthorized access to sensitive AWS resources and credentials stored in the server's environment.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-18
Last Modified
2025-12-31
Generated
2026-05-07
AI Q&A
2025-11-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
baryhuang aws_resources_mcp_server 0.1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a code injection flaw in baryhuang/mcp-server-aws-resources-python 0.1.0. It occurs because the execute_query method does not properly validate input and exposes dangerous Python built-in functions (__import__, getattr, hasattr) in its execution environment. This allows an attacker to execute arbitrary Python code remotely by crafting malicious queries, leading to unauthorized actions such as stealing AWS credentials, accessing the file system, and disclosing environment variables.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can execute arbitrary code on the affected server, which can result in theft of AWS credentials (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY), unauthorized access to the file system, disclosure of environment variables, and potentially full system compromise. This means attackers can bypass security controls and gain unauthorized access to sensitive AWS resources and credentials stored on the server.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart