PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-39309 TriliumNext CVE debrief

CVE-2026-39309 affects Trilium Notes versions 0.102.1 and earlier. According to the supplied NVD record and GitHub references, the issue is a macOS TCC bypass through prompt spoofing in the Electron configuration: a local attacker can abuse the app’s RunAsNode fuse to launch a Node.js subprocess and trigger misleading permission prompts that appear to come from Trilium Notes. The result is a UI and trust boundary problem on macOS, where sensitive permissions such as camera, microphone, screen, and protected folders may be requested under the trusted app’s identity. The issue is fixed in Trilium Notes 0.102.2.

Vendor
TriliumNext
Product
Trilium
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-20
Original CVE updated
2026-05-20
Advisory published
2026-05-20
Advisory updated
2026-05-20

Who should care

Anyone running Trilium Notes on macOS, especially users who grant privacy permissions, and administrators managing endpoints where local code execution or unexpected permission prompts are a concern.

Technical summary

The vulnerability is a local attack that leverages Electron configuration rather than a memory-safety flaw. The supplied description says the RunAsNode fuse allows Trilium Notes to be launched in a special Node.js mode with -e, enabling arbitrary command execution under the app’s identity. That identity is then used to surface macOS TCC prompts that look like they originated from Trilium Notes, which can mislead users into approving access to sensitive resources. NVD lists the issue with CVSS 3.1 vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N and maps weakness references to CWE-290 and CWE-451.

Defensive priority

Medium. The attack is local and requires user interaction, but it can undermine macOS privacy controls and prompt integrity for a trusted app.

Recommended defensive actions

  • Upgrade Trilium Notes to version 0.102.2 or later.
  • Review macOS privacy and TCC permissions granted to Trilium Notes and revoke anything unnecessary.
  • Treat unexpected permission dialogs shown while using Trilium Notes as suspicious, especially if they request camera, microphone, screen, or file access.
  • Restrict local code execution paths and application launch options on managed macOS endpoints where practical.
  • Monitor release notes and the GitHub security advisory for any follow-up guidance.

Evidence notes

The source corpus includes an official NVD record published and modified on 2026-05-20, with GitHub release and security advisory links indicating the fix in v0.102.2. NVD marks the record as Deferred and provides the CVSS vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N. No facts beyond the supplied description, NVD metadata, and official GitHub links were used.

Official resources

Publicly disclosed and published in the source record on 2026-05-20; remediation is available in Trilium Notes 0.102.2.