To remediate this issue, users should upgrade to version 1.3.9.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2cpp-j2fc-qhp7 | AWS API MCP File Access Restriction Bypass |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aws
Aws aws Api Mcp Server |
|
| Vendors & Products |
Aws
Aws aws Api Mcp Server |
Mon, 16 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Protection of Alternate Path exists in the no-access and workdir feature of the AWS API MCP Server versions >= 0.2.14 and < 1.3.9 on all platforms may allow the bypass of intended file access restriction and expose arbitrary local file contents in the MCP client application context. To remediate this issue, users should upgrade to version 1.3.9. | |
| Title | AWS API MCP File Access Restriction Bypass | |
| Weaknesses | CWE-424 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-03-16T18:17:17.927Z
Reserved: 2026-03-16T14:28:58.998Z
Link: CVE-2026-4270
Updated: 2026-03-16T18:17:12.656Z
Status : Awaiting Analysis
Published: 2026-03-16T17:16:32.270
Modified: 2026-03-17T14:20:01.670
Link: CVE-2026-4270
No data.
OpenCVE Enrichment
Updated: 2026-03-17T09:52:35Z
Github GHSA