When Memos 0.22 is configured to store objects locally, an attacker can create a file via the CreateResource endpoint containing a path traversal sequence in the name, allowing arbitrary file write on the server.
References
| Link | Resource |
|---|---|
| https://github.com/usememos/memos/blob/v0.24.4/server/router/api/v1/resource_service.go#L48 | Product |
| https://www.sonarsource.com/blog/securing-go-applications-with-sonarqube-real-world-examples/ | Exploit Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-09-03 17:15
Updated : 2025-09-09 18:30
NVD link : CVE-2025-56760
Mitre link : CVE-2025-56760
CVE.ORG link : CVE-2025-56760
JSON object : View
Products Affected
usememos
- memos
CWE
CWE-24
Path Traversal: '../filedir'
