A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths.
References
| Link | Resource |
|---|---|
| https://github.com/BeehiveInnovations/zen-mcp-server/issues/293 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/Team-Off-course/MCP-Server-Vuln-Analysis/blob/main/CVE-2025-66689.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-12 17:15
Updated : 2026-01-22 21:57
NVD link : CVE-2025-66689
Mitre link : CVE-2025-66689
CVE.ORG link : CVE-2025-66689
JSON object : View
Products Affected
busymac
- pal_mcp_server
