๐Ÿ” CVE Alert

CVE-2026-39309

MEDIUM 5.5

Trilium Notes: macOS TCC Bypass via Prompt Spoofing

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
2th

Trilium Notes is a cross-platform, hierarchical note taking application focused on building large personal knowledge bases. In versions 0.102.1 and prior, the Electron configuration is vulnerable to TCC Bypass via Prompt Spoofing, allowing local attackers to trigger misleading macOS permission prompts by running malicious code under the identity of the trusted app. The root cause is that the RunAsNode fuse allows launching the app in a special Node.js mode using -e to execute arbitrary system commands with Trilium Notes's permissions and identity. An attacker can leverage this through a subprocess to request any sensitive permissions, such as access to hardware (camera, microphone) and TCC-protected files, causing the TCC system prompt to appear as if the request came from Trilium rather than the attacker's code, because macOS treats the subprocess as part of the parent application. Exploitation allows access to TCC-protected resources like the screen, camera, microphone, and folders such as ~/Documents and ~/Downloads, undermining macOS's security model and UI integrity through social engineering. This issue has been fixed in version 0.102.2.

CWE CWE-451 CWE-290
Vendor triliumnext
Product trilium
Published May 19, 2026
Last Updated May 20, 2026
Stay Ahead of the Next One

Get instant alerts for triliumnext trilium

Be the first to know when new medium vulnerabilities affecting triliumnext trilium are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

TriliumNext / Trilium
< 0.102.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/TriliumNext/Trilium/security/advisories/GHSA-66pm-8hvq-2wwx github.com: https://github.com/TriliumNext/Trilium/releases/tag/v0.102.2