CVE-2025-56760

When Memos 0.22 is configured to store objects locally, an attacker can create a file via the CreateResource endpoint containing a path traversal sequence in the name, allowing arbitrary file write on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:usememos:memos:0.22.0:*:*:*:*:*:*:*

History

09 Sep 2025, 18:30

Type Values Removed Values Added
CPE cpe:2.3:a:usememos:memos:0.22.0:*:*:*:*:*:*:*
First Time Usememos
Usememos memos
References () https://github.com/usememos/memos/blob/v0.24.4/server/router/api/v1/resource_service.go#L48 - () https://github.com/usememos/memos/blob/v0.24.4/server/router/api/v1/resource_service.go#L48 - Product
References () https://www.sonarsource.com/blog/securing-go-applications-with-sonarqube-real-world-examples/ - () https://www.sonarsource.com/blog/securing-go-applications-with-sonarqube-real-world-examples/ - Exploit, Patch, Third Party Advisory

04 Sep 2025, 15:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 4.3

03 Sep 2025, 20:15

Type Values Removed Values Added
CWE CWE-24
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4

03 Sep 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-03 17:15

Updated : 2025-09-09 18:30


NVD link : CVE-2025-56760

Mitre link : CVE-2025-56760

CVE.ORG link : CVE-2025-56760


JSON object : View

Products Affected

usememos

  • memos
CWE
CWE-24

Path Traversal: '../filedir'