Description
Trilium Notes is a cross-platform, hierarchical note taking application focused on building large personal knowledge bases. In versions 0.102.1 and prior, the Electron configuration is vulnerable to TCC Bypass via Prompt Spoofing, allowing local attackers to trigger misleading macOS permission prompts by running malicious code under the identity of the trusted app. The root cause is that the RunAsNode fuse allows launching the app in a special Node.js mode using -e to execute arbitrary system commands with Trilium Notes's permissions and identity. An attacker can leverage this through a subprocess to request any sensitive permissions, such as access to hardware (camera, microphone) and TCC-protected files, causing the TCC system prompt to appear as if the request came from Trilium rather than the attacker's code, because macOS treats the subprocess as part of the parent application. Exploitation allows access to TCC-protected resources like the screen, camera, microphone, and folders such as ~/Documents and ~/Downloads, undermining macOS's security model and UI integrity through social engineering. This issue has been fixed in version 0.102.2.
Published: 2026-05-19
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Trilium Notes versions 0.102.1 and earlier allow a local attacker to execute arbitrary system commands with the application's identity by abusing the RunAsNode fuse. The attacker can launch a subprocess that requests any TCC‑protected permissions, such as access to the camera, microphone, screen recording, or user folders, and macOS displays the permission dialog as if it originated from Trilium Notes. This violates macOS's security model and enables social engineering by misrepresenting the source of permission requests.

Affected Systems

The vulnerability applies to Trilium Notes provided by TriliumNext. Affected releases are 0.102.1 and earlier; the issue was fixed in version 0.102.2. The threat is confined to macOS installations of Trilium.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate severity vulnerability that requires local code execution. Since the exploit is limited to the local user context and the EPSS information is unavailable, the likelihood of widespread exploitation is low. The vulnerability is not listed in CISA KEV. An attacker who can run code on the machine (e.g., through a malicious plug‑in or by tricking a user into running a script) can trigger misleading permission prompts and obtain sensitive data or hardware access by masquerading as Trilium Notes.

Generated by OpenCVE AI on May 20, 2026 at 01:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Trilium Notes to version 0.102.2 or later to remove the RunAsNode fuse that enables the TCC bypass.
  • If an immediate upgrade is impossible, revoke camera, microphone, and file system permissions for Trilium Notes in System Preferences → Security & Privacy → Privacy to deny the application privileged access until the patch is installed.
  • Continuously monitor macOS TCC logs for anomalous permission requests originating from Trilium to detect potential exploitation attempts.

Generated by OpenCVE AI on May 20, 2026 at 01:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Triliumnext
Triliumnext trilium
Vendors & Products Triliumnext
Triliumnext trilium

Wed, 20 May 2026 00:15:00 +0000

Type Values Removed Values Added
Description Trilium Notes is a cross-platform, hierarchical note taking application focused on building large personal knowledge bases. In versions 0.102.1 and prior, the Electron configuration is vulnerable to TCC Bypass via Prompt Spoofing, allowing local attackers to trigger misleading macOS permission prompts by running malicious code under the identity of the trusted app. The root cause is that the RunAsNode fuse allows launching the app in a special Node.js mode using -e to execute arbitrary system commands with Trilium Notes's permissions and identity. An attacker can leverage this through a subprocess to request any sensitive permissions, such as access to hardware (camera, microphone) and TCC-protected files, causing the TCC system prompt to appear as if the request came from Trilium rather than the attacker's code, because macOS treats the subprocess as part of the parent application. Exploitation allows access to TCC-protected resources like the screen, camera, microphone, and folders such as ~/Documents and ~/Downloads, undermining macOS's security model and UI integrity through social engineering. This issue has been fixed in version 0.102.2.
Title Trilium Notes: macOS TCC Bypass via Prompt Spoofing
Weaknesses CWE-290
CWE-451
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Subscriptions

Triliumnext Trilium
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-20T15:45:46.374Z

Reserved: 2026-04-06T19:31:07.265Z

Link: CVE-2026-39309

cve-icon Vulnrichment

Updated: 2026-05-20T13:59:12.618Z

cve-icon NVD

Status : Deferred

Published: 2026-05-20T00:16:37.613

Modified: 2026-05-20T17:16:22.433

Link: CVE-2026-39309

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T01:30:06Z

Weaknesses