CVE-2026-5059

| EUVD-2026-21656 CRITICAL
2026-04-11 zdi GHSA-fgmx-xfp3-w28p
9.8
CVSS 3.0
Share

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 11, 2026 - 01:00 vuln.today
EUVD ID Assigned
Apr 11, 2026 - 01:00 euvd
EUVD-2026-21656
CVE Published
Apr 11, 2026 - 00:15 nvd
CRITICAL 9.8

Description

aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the allowed commands list. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the MCP server. Was ZDI-CAN-27969.

Analysis

Remote code execution in aws-mcp-server 1.3.0 allows unauthenticated attackers to execute arbitrary commands via command injection in the allowed commands list handler. The vulnerability stems from improper validation of user-supplied strings before system call execution, enabling attackers to run code in the MCP server context with no authentication required. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all systems running aws-mcp-server and isolate affected instances from production networks if patching is not immediately possible. Within 7 days: Contact AWS support for patch availability timeline and interim guidance; implement network segmentation to restrict access to MCP server ports to trusted sources only. …

Sign in for detailed remediation steps.

Priority Score

50
Low Medium High Critical
KEV: 0
EPSS: +1.0
CVSS: +49
POC: 0

Share

CVE-2026-5059 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy