CVE-2026-5058
Received Received - Intake
Command Injection in aws-mcp-server Allows Remote Code Execution

Publication date: 2026-04-11

Last updated on: 2026-04-11

Assigner: Zero Day Initiative

Description
aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the allowed commands list. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the MCP server. Was ZDI-CAN-27968.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-11
Last Modified
2026-04-11
Generated
2026-05-07
AI Q&A
2026-04-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
aws aws_mcp_server to 2026-05-01 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows remote attackers to execute arbitrary code on the affected system without authentication.

  • Full system compromise by running malicious code with MCP server privileges.
  • Potential loss of confidentiality, integrity, and availability of the system.
  • Disruption of services or unauthorized access to sensitive data.

What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediate steps should include restricting access to the aws-mcp-server to trusted networks only, as the vulnerability allows unauthenticated remote code execution.

Additionally, applying any available patches or updates from the vendor that address this command injection flaw is critical.

Monitoring and limiting the commands allowed by the aws-mcp-server, if configurable, may also reduce risk until a patch is applied.


Can you explain this vulnerability to me?

CVE-2026-5058 is a critical remote code execution vulnerability in the aws-mcp-server product. It occurs due to improper validation of a user-supplied string within the handling of the allowed commands list. Because of this flaw, an attacker can execute arbitrary system commands remotely without needing to authenticate.

This means that the attacker can run code in the context of the MCP server, potentially gaining control over the affected system.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows remote attackers to execute arbitrary code on affected systems without authentication, potentially leading to full system compromise.

Such a compromise could result in unauthorized access to sensitive data, which may violate data protection requirements under standards like GDPR and HIPAA.

Therefore, organizations using the affected aws-mcp-server could face compliance risks if this vulnerability is exploited, as it undermines the confidentiality, integrity, and availability of protected data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart