CVE-2026-5058
🟠 Łataj w tym tygodniu
Wstrzyknięcie poleceń w aws-mcp-server umożliwia zdalne wykonanie dowolnego kodu.
CVSS
9.8
EPSS
1.0%
Exploit
none
Vendor
Opis źródłowy (NVD)
aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the allowed commands list. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the MCP server. Was ZDI-CAN-27968.
rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 1.0% |
| Opublikowano (NVD) | 2026-04-11 01:16:18 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-11 01:16:18 UTC |
Referencje
- https://www.zerodayinitiative.com/advisories/ZDI-26-246/ (zdi-disclosures@trendmicro.com)