A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 12 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
CWE-552
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-01-12T18:34:48.370Z

Reserved: 2025-12-08T00:00:00.000Z

Link: CVE-2025-66689

cve-icon Vulnrichment

Updated: 2026-01-12T18:33:24.699Z

cve-icon NVD

Status : Received

Published: 2026-01-12T17:15:52.297

Modified: 2026-01-12T19:16:01.080

Link: CVE-2025-66689

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses