To remediate this issue, users should upgrade to version 1.3.9.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2cpp-j2fc-qhp7 | AWS API MCP File Access Restriction Bypass |
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aws
Aws aws Api Mcp Server |
|
| Vendors & Products |
Aws
Aws aws Api Mcp Server |
Mon, 16 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Protection of Alternate Path exists in the no-access and workdir feature of the AWS API MCP Server versions >= 0.2.14 and < 1.3.9 on all platforms may allow the bypass of intended file access restriction and expose arbitrary local file contents in the MCP client application context. To remediate this issue, users should upgrade to version 1.3.9. | |
| Title | AWS API MCP File Access Restriction Bypass | |
| Weaknesses | CWE-424 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-03-16T18:17:17.927Z
Reserved: 2026-03-16T14:28:58.998Z
Link: CVE-2026-4270
Updated: 2026-03-16T18:17:12.656Z
Status : Awaiting Analysis
Published: 2026-03-16T17:16:32.270
Modified: 2026-03-17T14:20:01.670
Link: CVE-2026-4270
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:50:17Z
Github GHSA