[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-5059":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-11T20:12:46.593Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":41,"duplicate_of":9,"upstream":42,"downstream":43,"duplicates":44,"related":45,"reserved_at":9,"published_at":46,"modified_at":46,"state":47,"summary":48,"references_raw":57,"kevs":64,"epss":65,"epss_history":68,"metrics":70,"affected":77},"CVE-2026-5059","aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the allowed commands list. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the MCP server. Was ZDI-CAN-27969.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-78","Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-108","Command Line Execution through SQL Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-15","Command Delimiters",[],{"id":29,"name":30,"techniques":31},"CAPEC-43","Exploiting Multiple Input Interpretation Layers",[],{"id":33,"name":34,"techniques":35},"CAPEC-6","Argument Injection",[],{"id":37,"name":38,"techniques":39},"CAPEC-88","OS Command Injection",[],[],[],[],[],[],[],"2026-04-11T00:15:02.920Z","Received",{"cisa_kev":49,"cisa_ransomware":49,"cisa_vendor":9,"epss_severity":50,"epss_score":51,"severity":52,"severity_score":53,"severity_version":54,"severity_source":55,"severity_vector":56,"severity_status":47},false,"low",0.01013,"critical",9.8,"v3.0","cve.org","CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[58],{"url":59,"sources":60,"tags":62},"https://www.zerodayinitiative.com/advisories/ZDI-26-245/",[55,61],"nvd",[63],"X Research Advisory",[],{"date":66,"score":51,"percentile":67},"2026-04-11",0.77156,[69],{"date":66,"score":51,"percentile":67},[71,75],{"source":55,"cvss_v2_0":9,"cvss_v3_0":72,"cvss_v3_1":9,"cvss_v4_0":9},{"baseScore":53,"baseSeverity":73,"vectorString":56,"impactScore":53,"exploitabilityScore":74},"CRITICAL",10,{"source":61,"cvss_v2_0":9,"cvss_v3_0":76,"cvss_v3_1":9,"cvss_v4_0":9},{"baseScore":53,"baseSeverity":73,"vectorString":56,"impactScore":53,"exploitabilityScore":74},[78],{"ecosystem":9,"name":79,"vendor":79,"product":79,"cpe_part":80,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":81},"aws-mcp-server","a",[82],{"version":83,"is_range":49,"range_type":55,"version_start":83,"version_start_type":84,"version_end":83,"version_end_type":84,"fixed_in":9},"1.3.0","including"]