Home

Description

A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths.

PUBLISHED Reserved 2025-12-08 | Published 2026-01-12 | Updated 2026-01-12 | Assigner mitre

References

github.com/BeehiveInnovations/zen-mcp-server/issues/293

github.com/...rver-Vuln-Analysis/blob/main/CVE-2025-66689.md

cve.org (CVE-2025-66689)

nvd.nist.gov (CVE-2025-66689)

Download JSON