Advisory Details

October 30th, 2025

evernote-mcp-server openBrowser Command Injection Privilege Escalation Vulnerability

ZDI-25-983
ZDI-CAN-27913

CVE ID CVE-2025-12489
CVSS SCORE 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS evernote-mcp-server
AFFECTED PRODUCTS evernote-mcp-server
VULNERABILITY DETAILS

This vulnerability allows local attackers to escalate privileges on affected installations of evernote-mcp-server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the openBrowser function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account.

ADDITIONAL DETAILS evernote-mcp-server has issued an update to correct this vulnerability. More details can be found at:
https://github.com/brentmid/evernote-mcp-server/commit/1e66c78c4ce6ea294ac6b0eb289a9eae9c5e9579
DISCLOSURE TIMELINE
  • 2025-09-23 - Vulnerability reported to vendor
  • 2025-10-30 - Coordinated public release of advisory
  • 2025-10-30 - Advisory Updated
CREDIT Peter Girnus (@gothburz) and Brandon Niemczyk of Trend Zero Day Initiative
BACK TO ADVISORIES