Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 12 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 CWE-552 |
|
| Metrics |
cvssV3_1
|
Mon, 12 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-12T18:34:48.370Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66689
Updated: 2026-01-12T18:33:24.699Z
Status : Received
Published: 2026-01-12T17:15:52.297
Modified: 2026-01-12T19:16:01.080
Link: CVE-2025-66689
No data.
OpenCVE Enrichment
No data.