A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths.
Metrics
Affected Vendors & Products
References
History
Mon, 12 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 CWE-552 |
|
| Metrics |
cvssV3_1
|
Mon, 12 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-12T18:34:48.370Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66689
Updated: 2026-01-12T18:33:24.699Z
Status : Awaiting Analysis
Published: 2026-01-12T17:15:52.297
Modified: 2026-01-13T14:03:18.990
Link: CVE-2025-66689
No data.
OpenCVE Enrichment
No data.