{ "dataType": "CVE_RECORD", "dataVersion": "5.2", "cveMetadata": { "cveId": "CVE-2026-5058", "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "state": "PUBLISHED", "assignerShortName": "zdi", "dateReserved": "2026-03-27T18:09:58.198Z", "datePublished": "2026-04-11T00:14:52.192Z", "dateUpdated": "2026-04-11T00:14:52.192Z" }, "containers": { "cna": { "providerMetadata": { "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi", "dateUpdated": "2026-04-11T00:14:52.192Z" }, "title": "aws-mcp-server Command Injection Remote Code Execution Vulnerability", "descriptions": [ { "lang": "en", "value": "aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the allowed commands list. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the MCP server. Was ZDI-CAN-27968." } ], "affected": [ { "vendor": "aws-mcp-server", "product": "aws-mcp-server", "versions": [ { "version": "1.3.0", "status": "affected" } ], "defaultStatus": "unknown" } ], "problemTypes": [ { "descriptions": [ { "lang": "en", "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", "type": "CWE" } ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-26-246/", "name": "ZDI-26-246", "tags": [ "x_research-advisory" ] } ], "dateAssigned": "2026-03-27T18:09:58.221Z", "datePublic": "2026-03-30T18:02:15.538Z", "source": { "lang": "en", "value": "Alfredo Oliveira and David Fiser of Trend Research" }, "metrics": [ { "format": "CVSS", "cvssV3_0": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL" } } ] } } }