| CVE ID | CVE-2025-12489 |
| CVSS SCORE | 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
evernote-mcp-server |
| AFFECTED PRODUCTS |
evernote-mcp-server |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of evernote-mcp-server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the openBrowser function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. |
| ADDITIONAL DETAILS |
evernote-mcp-server has issued an update to correct this vulnerability. More details can be found at:
https://github.com/brentmid/evernote-mcp-server/commit/1e66c78c4ce6ea294ac6b0eb289a9eae9c5e9579 |
| DISCLOSURE TIMELINE |
|
| CREDIT | Peter Girnus (@gothburz) and Brandon Niemczyk of Trend Zero Day Initiative |