CVE-2026-5058
Command Injection in aws-mcp-server Allows Remote Code Execution
Publication date: 2026-04-11
Last updated on: 2026-04-11
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| aws | aws_mcp_server | to 2026-05-01 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can have severe impacts as it allows remote attackers to execute arbitrary code on the affected system without authentication.
- Full system compromise by running malicious code with MCP server privileges.
- Potential loss of confidentiality, integrity, and availability of the system.
- Disruption of services or unauthorized access to sensitive data.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediate steps should include restricting access to the aws-mcp-server to trusted networks only, as the vulnerability allows unauthenticated remote code execution.
Additionally, applying any available patches or updates from the vendor that address this command injection flaw is critical.
Monitoring and limiting the commands allowed by the aws-mcp-server, if configurable, may also reduce risk until a patch is applied.
Can you explain this vulnerability to me?
CVE-2026-5058 is a critical remote code execution vulnerability in the aws-mcp-server product. It occurs due to improper validation of a user-supplied string within the handling of the allowed commands list. Because of this flaw, an attacker can execute arbitrary system commands remotely without needing to authenticate.
This means that the attacker can run code in the context of the MCP server, potentially gaining control over the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows remote attackers to execute arbitrary code on affected systems without authentication, potentially leading to full system compromise.
Such a compromise could result in unauthorized access to sensitive data, which may violate data protection requirements under standards like GDPR and HIPAA.
Therefore, organizations using the affected aws-mcp-server could face compliance risks if this vulnerability is exploited, as it undermines the confidentiality, integrity, and availability of protected data.