Skip to main content

CVE-2026-4270 - AWS API MCP File Access Restriction Bypass

Posted on: Mar 16, 2026

Bulletin ID: 2026-007-AWS
Scope: AWS
Content Type: Important (requires attention)
Publication Date: 03/16/2026 9:15 AM PDT
 

Description:

The AWS API MCP Server is an open source Model Context Protocol (MCP) server that enables AI assistants to interact with AWS services and resources through AWS CLI commands. It provides programmatic access to manage your AWS infrastructure while maintaining proper security controls.

This server acts as a bridge between AI assistants and AWS services, allowing you to create, update, and manage AWS resources across all available services. The server includes a configurable file access feature that controls how AWS CLI commands interact with the local file system. By default, file operations are restricted to a designated working directory (workdir), but this can be configured to allow unrestricted file system access (unrestricted) or to block all local file path arguments entirely (no-access).

We identified CVE-2026-4270: Improper Protection of Alternate Path exists in the no-access and workdir feature of the AWS API MCP Server versions >= 0.2.14 and < 1.3.9 on all platforms may allow the bypass of intended file access restriction and expose arbitrary local file contents in the MCP client application context.

Impacted versions: awslabs.aws-api-mcp-server >= 0.2.14, < 1.3.9

Resolution:

This issue has been addressed in awslabs.aws-api-mcp-server version 1.3.9. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes.

Workarounds:

No workarounds.

References:

Acknowledgement:

We would like to thank Varonis Threat Labs for collaborating on this issue through the coordinated vulnerability disclosure process.
 

Please email aws-security@amazon.com with any security questions or concerns.