CVE-2025-66689

Source
https://cve.org/CVERecord?id=CVE-2025-66689
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-66689.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-66689
Published
2026-01-12T17:15:52.297Z
Modified
2026-01-30T22:52:27.471180Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the isdangerouspath() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths.

References

Affected packages

Git / github.com/beehiveinnovations/pal-mcp-server

Affected ranges

Type
GIT
Repo
https://github.com/beehiveinnovations/pal-mcp-server
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.1.0
v5.*
v5.10.0
v5.10.1
v5.10.2
v5.10.3
v5.11.0
v5.11.1
v5.11.2
v5.12.0
v5.12.1
v5.13.0
v5.14.0
v5.14.1
v5.15.0
v5.16.0
v5.17.0
v5.17.1
v5.17.2
v5.17.3
v5.17.4
v5.18.0
v5.18.1
v5.18.2
v5.18.3
v5.19.0
v5.20.0
v5.20.1
v5.21.0
v5.22.0
v5.8.5
v5.8.6
v5.9.0
v6.*
v6.0.0
v6.1.0
v7.*
v7.0.0
v7.0.1
v7.0.2
v7.1.0
v7.1.1
v7.2.0
v7.3.0
v7.4.0
v7.5.0
v7.5.1
v7.5.2
v7.6.0
v7.7.0
v7.8.0
v7.8.1
v8.*
v8.0.0
v8.0.1
v8.0.2
v9.*
v9.0.0
v9.0.1
v9.0.2
v9.0.3
v9.0.4
v9.1.0
v9.1.1
v9.1.2
v9.1.3
v9.1.4
v9.2.0
v9.2.1
v9.2.2
v9.3.0
v9.3.1
v9.4.0
v9.4.1
v9.4.2
v9.5.0
v9.6.0
v9.7.0
v9.8.0
v9.8.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-66689.json"