Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. awslabs.aws-api-mcp-server
  4. ›
  5. CVE-2026-4270

CVE-2026-4270: AWS API MCP File Access Restriction Bypass

March 17, 2026

The AWS API MCP Server is an open source Model Context Protocol (MCP) server that enables AI assistants to interact with AWS services and resources through AWS CLI commands. It provides programmatic access to manage your AWS infrastructure while maintaining proper security controls.

This server acts as a bridge between AI assistants and AWS services, allowing you to create, update, and manage AWS resources across all available services. The server includes a configurable file access feature that controls how AWS CLI commands interact with the local file system. By default, file operations are restricted to a designated working directory (workdir), but this can be configured to allow unrestricted file system access (unrestricted) or to block all local file path arguments entirely (no-access).

Description: Improper Protection of Alternate Path exists in the no-access and workdir feature of the AWS API MCP Server versions >= 0.2.14 and < 1.3.9 on all platforms may allow the bypass of intended file access restriction and expose arbitrary local file contents in the MCP client application context.

To remediate this issue, users should upgrade to version 1.3.9.

References

  • aws.amazon.com/security/security-bulletins/2026-007-AWS
  • github.com/advisories/GHSA-2cpp-j2fc-qhp7
  • github.com/awslabs/mcp
  • github.com/awslabs/mcp/security/advisories/GHSA-2cpp-j2fc-qhp7
  • nvd.nist.gov/vuln/detail/CVE-2026-4270
  • pypi.org/project/awslabs.aws-api-mcp-server/1.3.9

Code Behaviors & Features

Detect and mitigate CVE-2026-4270 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.2.14 before 1.3.9

Fixed versions

  • 1.3.9

Solution

Upgrade to version 1.3.9 or above.

Impact 5.5 MEDIUM

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-424: Improper Protection of Alternate Path

Source file

pypi/awslabs.aws-api-mcp-server/CVE-2026-4270.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:31 +0000.