PyPI: awslabs-aws-api-mcp-server

CVE-2026-4270

Safety vulnerability ID: SFTY-20260317-55129

Safety legacy ID: pyup.io-89625

Affected versions of the File Browser package are vulnerable to Broken Authentication due to JWT tokens remaining valid after logout. The /api/login endpoint issues long-lived JWTs, and the authentication logic in http/auth.go only checks token expiry and d.store.Users.LastUpdate(tk.User.ID) without implementing server-side session tracking, token revocation, or a logout blacklist.

Created at: Mar 18, 2026Updated at: Mar 18, 2026

Overview

AWS API MCP File Access Restriction Bypass

Advisory

Affected versions of the File Browser package are vulnerable to Broken Authentication due to JWT tokens remaining valid after logout. The /api/login endpoint issues long-lived JWTs, and the authentication logic in http/auth.go only checks token expiry and d.store.Users.LastUpdate(tk.User.ID) without implementing server-side session tracking, token revocation, or a logout blacklist.

Affected Package

Affecting awslabs-aws-api-mcp-server package, versions
>=0.2.14,<1.3.9

Also affects

---

How to Fix

Upgrade
awslabs-aws-api-mcp-server
to
1.3.9
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more