When Memos 0.22 is configured to store objects locally, an attacker can create a file via the CreateResource endpoint containing a path traversal sequence in the name, allowing arbitrary file write on the server.
References
Link | Resource |
---|---|
https://github.com/usememos/memos/blob/v0.24.4/server/router/api/v1/resource_service.go#L48 | Product |
https://www.sonarsource.com/blog/securing-go-applications-with-sonarqube-real-world-examples/ | Exploit Patch Third Party Advisory |
Configurations
History
09 Sep 2025, 18:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:usememos:memos:0.22.0:*:*:*:*:*:*:* | |
First Time |
Usememos
Usememos memos |
|
References | () https://github.com/usememos/memos/blob/v0.24.4/server/router/api/v1/resource_service.go#L48 - Product | |
References | () https://www.sonarsource.com/blog/securing-go-applications-with-sonarqube-real-world-examples/ - Exploit, Patch, Third Party Advisory |
04 Sep 2025, 15:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
03 Sep 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-24 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
03 Sep 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-03 17:15
Updated : 2025-09-09 18:30
NVD link : CVE-2025-56760
Mitre link : CVE-2025-56760
CVE.ORG link : CVE-2025-56760
JSON object : View
Products Affected
usememos
- memos
CWE
CWE-24
Path Traversal: '../filedir'