Impact
Trilium Notes versions 0.102.1 and earlier allow a local attacker to execute arbitrary system commands with the application's identity by abusing the RunAsNode fuse. The attacker can launch a subprocess that requests any TCC‑protected permissions, such as access to the camera, microphone, screen recording, or user folders, and macOS displays the permission dialog as if it originated from Trilium Notes. This violates macOS's security model and enables social engineering by misrepresenting the source of permission requests.
Affected Systems
The vulnerability applies to Trilium Notes provided by TriliumNext. Affected releases are 0.102.1 and earlier; the issue was fixed in version 0.102.2. The threat is confined to macOS installations of Trilium.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity vulnerability that requires local code execution. Since the exploit is limited to the local user context and the EPSS information is unavailable, the likelihood of widespread exploitation is low. The vulnerability is not listed in CISA KEV. An attacker who can run code on the machine (e.g., through a malicious plug‑in or by tricking a user into running a script) can trigger misleading permission prompts and obtain sensitive data or hardware access by masquerading as Trilium Notes.
OpenCVE Enrichment