TCC Bypass Vulnerability in Trilium Notes by Trilium Next
CVE-2026-39309
What is CVE-2026-39309?
Trilium Notes, a popular hierarchical note-taking application, has a TCC Bypass vulnerability present in versions up to 0.102.1. This flaw arises from the application's Electron configuration, which can be exploited by local attackers through prompt spoofing. Attackers can trigger misleading permission prompts that appear to originate from Trilium Notes, while executing malicious code in the background. The underlying issue involves the RunAsNode feature, allowing malicious commands to run under the trusted application’s identity. As a result, sensitive hardware permissions and TCC-protected files can be accessed without the user's awareness, compromising the security integrity that macOS is designed to uphold. The vulnerability has been addressed in version 0.102.2.
Affected Version(s)
Trilium < 0.102.2
