CVE-2025-66689

6.5 MEDIUM

📋 TL;DR

A path traversal vulnerability in Zen MCP Server allows authenticated attackers to read arbitrary files on the system by bypassing directory blacklist restrictions. This affects all Zen MCP Server versions before 9.8.2 where attackers have valid credentials. The vulnerability stems from flawed validation logic that uses exact string matching against system directories.

💻 Affected Systems

Products:
  • Zen MCP Server
Versions: All versions before 9.8.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the MCP server interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, SSH keys, database credentials, or other confidential data, potentially leading to full system compromise.

🟠

Likely Case

Authenticated attackers reading application configuration files, user data, or other files accessible to the server process.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation, though sensitive data exposure remains possible.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once credentials are obtained. Public proof-of-concept exists in GitHub references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.8.2

Vendor Advisory: https://github.com/BeehiveInnovations/zen-mcp-server/issues/293

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Stop Zen MCP Server service. 3. Update to version 9.8.2 or later. 4. Restart the service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict File System Access

linux

Run Zen MCP Server with minimal file system permissions using containerization or restricted user accounts.

sudo chroot /var/zen-mcp /usr/bin/zen-mcp-server
sudo setfacl -m u:zenuser:rx /var/zen-mcp

Network Segmentation

linux

Restrict access to Zen MCP Server to trusted networks only using firewall rules.

sudo iptables -A INPUT -p tcp --dport 8080 -s 192.168.1.0/24 -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 8080 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit which users can reach the Zen MCP Server interface.
  • Apply file system permissions to restrict what files the Zen MCP Server process can read.

🔍 How to Verify

Check if Vulnerable:

Check Zen MCP Server version: if version is less than 9.8.2, the system is vulnerable.

Check Version:

zen-mcp-server --version

Verify Fix Applied:

After updating, verify the version is 9.8.2 or higher and test path traversal attempts against known vulnerable endpoints.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in server logs
  • Multiple failed path traversal attempts
  • Access to system directories from MCP requests

Network Indicators:

  • Unusual volume of file read requests to MCP server
  • Requests containing path traversal patterns like '../' or directory bypass attempts

SIEM Query:

source="zen-mcp.log" AND ("..\" OR "/etc/" OR "/root/") AND action="read"

🔗 References

📤 Share & Export