Skip to content

Commit f336385

Browse files
committed
1 parent 0cbccba commit f336385

File tree

1 file changed

+24
-2
lines changed

1 file changed

+24
-2
lines changed

advisories/unreviewed/2026/04/GHSA-fgmx-xfp3-w28p/GHSA-fgmx-xfp3-w28p.json

Lines changed: 24 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,46 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fgmx-xfp3-w28p",
4-
"modified": "2026-04-11T03:30:30Z",
4+
"modified": "2026-04-11T03:30:41Z",
55
"published": "2026-04-11T03:30:30Z",
66
"aliases": [
77
"CVE-2026-5059"
88
],
9+
"summary": "AWS CLI Command Injection Remote Code Execution Vulnerability",
910
"details": "aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the allowed commands list. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the MCP server. Was ZDI-CAN-27969.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "aws-mcp"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
}
30+
]
31+
}
32+
]
33+
}
34+
],
1735
"references": [
1836
{
1937
"type": "ADVISORY",
2038
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5059"
2139
},
40+
{
41+
"type": "PACKAGE",
42+
"url": "https://github.com/alexei-led/aws-mcp-server"
43+
},
2244
{
2345
"type": "WEB",
2446
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-245"

0 commit comments

Comments
 (0)