A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths.
History

Mon, 12 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
CWE-552
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-01-12T18:34:48.370Z

Reserved: 2025-12-08T00:00:00.000Z

Link: CVE-2025-66689

cve-icon Vulnrichment

Updated: 2026-01-12T18:33:24.699Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-12T17:15:52.297

Modified: 2026-01-13T14:03:18.990

Link: CVE-2025-66689

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.