CVE-2026-5058
AWS · aws-mcp-server
The aws-mcp-server is vulnerable to remote code execution via command injection due to improper validation of user-supplied input in the allowed commands list.
Executive summary
An unauthenticated remote code execution vulnerability in aws-mcp-server allows attackers to execute arbitrary system commands, posing a critical risk to server integrity.
Vulnerability
This is a command injection vulnerability where the application fails to sanitize input before passing it to a system call. The vulnerability is exploitable by unauthenticated remote attackers.
Business impact
With a CVSS score of 9.8, this vulnerability represents a critical risk. Successful exploitation grants an attacker the ability to execute arbitrary code within the context of the MCP server, potentially leading to full system compromise, data exfiltration, and unauthorized lateral movement within the AWS environment.
Remediation
Immediate Action: Apply the latest security patches or updates provided by the vendor to the aws-mcp-server installations immediately.
Proactive Monitoring: Review system and application logs for unusual process execution or shell command invocations originating from the MCP service.
Compensating Controls: Implement strict network ingress filtering to restrict access to the MCP server to known, trusted IP addresses, effectively limiting the attack surface.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Given the critical CVSS severity, organizations should prioritize patching affected aws-mcp-server instances. Failure to remediate this vulnerability may result in total system compromise.