Command Injection Vulnerability in AWS MCP Server
CVE-2025-5277
Key Information:
- Vendor
Alexei-led
- Status
- Vendor
- CVE Published:
- 28 May 2025
Badges
What is CVE-2025-5277?
CVE-2025-5277 is a command injection vulnerability found in the AWS MCP Server developed by Alexei-led. This vulnerability allows an attacker to execute arbitrary commands on the host system by crafting specific prompts that are subsequently processed by the MCP client. The AWS MCP Server is designed to facilitate operations within cloud environments, and the existence of this vulnerability poses a significant threat to the integrity and security of systems utilizing this software. If exploited, an attacker could gain unauthorized access to sensitive data, manipulate system behavior, and disrupt normal operations, leading to critical security breaches.
Potential impact of CVE-2025-5277
-
Unauthorized Command Execution: The vulnerability enables attackers to run arbitrary commands on affected systems, which can lead to unauthorized data manipulation, the installation of malware, or the complete takeover of the host system.
-
System Compromise and Data Breach: With the ability to execute commands remotely, attackers could gain access to sensitive information, potentially leading to significant data breaches and the exposure of confidential organizational data.
-
Operational Disruption: Exploiting this vulnerability could result in service outages or degraded performance of the AWS MCP Server, disrupting business operations and affecting service delivery to end-users.
Affected Version(s)
aws-mcp-server 0 < 1.3.0
News Articles
CVE Trends Dashboard
We're in the process of developing the mobile version of our website to improve your browsing experience on smaller screens. Keep an eye out for its release in the near future.Thank you for your patience!

CVE-2025-5277
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve...
References
CVSS V4
Timeline
- 📰
First article discovered by basefortify.eu
Vulnerability published
Vulnerability Reserved