Advisory Details

March 30th, 2026

(0Day) aws-mcp-server Command Injection Remote Code Execution Vulnerability

ZDI-26-246
ZDI-CAN-27968

CVE ID CVE-2026-5058
CVSS SCORE 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS aws-mcp-server
AFFECTED PRODUCTS aws-mcp-server
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of the allowed commands list. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the MCP server.

ADDITIONAL DETAILS

09/03/25 – ZDI submitted the report to the vendor
10/27/25 – ZDI asked to confirm the receipt of the report
11/06/25 – ZDI asked for updates
12/14/25 – ZDI notified the vendor of the intention to publish the case as a 0-day advisory
12/15/25 – The vendor rejected the vulnerability
02/20/26 – ZDI provided more information
03/09/26 – ZDI notified the vendor of the intention to publish the case as a 0-day advisory


DISCLOSURE TIMELINE
  • 2025-09-03 - Vulnerability reported to vendor
  • 2026-03-30 - Coordinated public release of advisory
  • 2026-03-30 - Advisory Updated
CREDIT Alfredo Oliveira and David Fiser of Trend Research
BACK TO ADVISORIES