CVE-2025-63604

Source
https://cve.org/CVERecord?id=CVE-2025-63604
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63604.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-63604
Published
2025-11-18T16:15:46.060Z
Modified
2026-03-13T03:40:50.840041Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A code injection vulnerability exists in baryhuang/mcp-server-aws-resources-python 0.1.0 that allows remote code execution through insufficient input validation in the executequery method. The vulnerability stems from the exposure of dangerous Python built-in functions (import, getattr, hasattr) in the execution namespace and the direct use of exec() to execute user-supplied code. An attacker can craft malicious queries to execute arbitrary Python code, leading to AWS credential theft (AWSACCESSKEYID, AWSSECRETACCESS_KEY), file system access, environment variable disclosure, and potential system compromise. The vulnerability allows attackers to bypass intended security controls and gain unauthorized access to sensitive AWS resources and credentials stored in the server's environment.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63604.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "0.1.0"
            }
        ]
    }
]