Vulnerability Details CVE-2025-66689
A path traversal vulnerability exists in Zen MCP Server before 9.8.2 that allows authenticated attackers to read arbitrary files on the system. The vulnerability is caused by flawed logic in the is_dangerous_path() validation function that uses exact string matching against a blacklist of system directories. Attackers can bypass these restrictions by accessing subdirectories of blacklisted paths.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.7%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2025-66689
-
cpe:2.3:a:busymac:pal_mcp_server:1.1.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.10.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.10.1
-
cpe:2.3:a:busymac:pal_mcp_server:5.10.2
-
cpe:2.3:a:busymac:pal_mcp_server:5.10.3
-
cpe:2.3:a:busymac:pal_mcp_server:5.11.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.11.1
-
cpe:2.3:a:busymac:pal_mcp_server:5.11.2
-
cpe:2.3:a:busymac:pal_mcp_server:5.12.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.12.1
-
cpe:2.3:a:busymac:pal_mcp_server:5.13.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.14.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.14.1
-
cpe:2.3:a:busymac:pal_mcp_server:5.15.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.16.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.17.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.17.1
-
cpe:2.3:a:busymac:pal_mcp_server:5.17.2
-
cpe:2.3:a:busymac:pal_mcp_server:5.17.3
-
cpe:2.3:a:busymac:pal_mcp_server:5.17.4
-
cpe:2.3:a:busymac:pal_mcp_server:5.18.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.18.1
-
cpe:2.3:a:busymac:pal_mcp_server:5.18.2
-
cpe:2.3:a:busymac:pal_mcp_server:5.18.3
-
cpe:2.3:a:busymac:pal_mcp_server:5.19.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.20.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.20.1
-
cpe:2.3:a:busymac:pal_mcp_server:5.21.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.22.0
-
cpe:2.3:a:busymac:pal_mcp_server:5.8.5
-
cpe:2.3:a:busymac:pal_mcp_server:5.8.6
-
cpe:2.3:a:busymac:pal_mcp_server:5.9.0
-
cpe:2.3:a:busymac:pal_mcp_server:6.0.0
-
cpe:2.3:a:busymac:pal_mcp_server:6.1.0
-
cpe:2.3:a:busymac:pal_mcp_server:7.0.0
-
cpe:2.3:a:busymac:pal_mcp_server:7.0.1
-
cpe:2.3:a:busymac:pal_mcp_server:7.0.2
-
cpe:2.3:a:busymac:pal_mcp_server:7.1.0
-
cpe:2.3:a:busymac:pal_mcp_server:7.1.1
-
cpe:2.3:a:busymac:pal_mcp_server:7.2.0
-
cpe:2.3:a:busymac:pal_mcp_server:7.3.0
-
cpe:2.3:a:busymac:pal_mcp_server:7.4.0
-
cpe:2.3:a:busymac:pal_mcp_server:7.5.0
-
cpe:2.3:a:busymac:pal_mcp_server:7.5.1
-
cpe:2.3:a:busymac:pal_mcp_server:7.5.2
-
cpe:2.3:a:busymac:pal_mcp_server:7.6.0
-
cpe:2.3:a:busymac:pal_mcp_server:7.7.0
-
cpe:2.3:a:busymac:pal_mcp_server:7.8.0
-
cpe:2.3:a:busymac:pal_mcp_server:7.8.1
-
cpe:2.3:a:busymac:pal_mcp_server:8.0.0
-
cpe:2.3:a:busymac:pal_mcp_server:8.0.1
-
cpe:2.3:a:busymac:pal_mcp_server:8.0.2
-
cpe:2.3:a:busymac:pal_mcp_server:9.0.0
-
cpe:2.3:a:busymac:pal_mcp_server:9.0.1
-
cpe:2.3:a:busymac:pal_mcp_server:9.0.2
-
cpe:2.3:a:busymac:pal_mcp_server:9.0.3
-
cpe:2.3:a:busymac:pal_mcp_server:9.0.4
-
cpe:2.3:a:busymac:pal_mcp_server:9.1.0
-
cpe:2.3:a:busymac:pal_mcp_server:9.1.1
-
cpe:2.3:a:busymac:pal_mcp_server:9.1.2
-
cpe:2.3:a:busymac:pal_mcp_server:9.1.3
-
cpe:2.3:a:busymac:pal_mcp_server:9.1.4
-
cpe:2.3:a:busymac:pal_mcp_server:9.2.0
-
cpe:2.3:a:busymac:pal_mcp_server:9.2.1
-
cpe:2.3:a:busymac:pal_mcp_server:9.2.2
-
cpe:2.3:a:busymac:pal_mcp_server:9.3.0
-
cpe:2.3:a:busymac:pal_mcp_server:9.3.1
-
cpe:2.3:a:busymac:pal_mcp_server:9.4.0
-
cpe:2.3:a:busymac:pal_mcp_server:9.4.1
-
cpe:2.3:a:busymac:pal_mcp_server:9.4.2
-
cpe:2.3:a:busymac:pal_mcp_server:9.5.0
-
cpe:2.3:a:busymac:pal_mcp_server:9.6.0
-
cpe:2.3:a:busymac:pal_mcp_server:9.7.0
-
cpe:2.3:a:busymac:pal_mcp_server:9.8.0
-
cpe:2.3:a:busymac:pal_mcp_server:9.8.1