github.com/usememos/memos known bugs

go

134 known bugs in github.com/usememos/memos, with affected versions, fixes and workarounds. Sourced from upstream issue trackers.

134
bugs
Known bugs
SeverityAffectedFixed inTitleStatusSource
highany0.9.0
usememos/memos vulnerable to account takeover due to improper access control
usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Versions prior to 0.9.0 improperly maintain access control allowing an attacker to take over an account by changing header values in the HTTP request.
fixedosv:GHSA-w57v-6xp4-rm2v
highany0.9.0
usememos/memos vulnerable to improper authorization
usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos versions prior to 0.9.0 are vulnerable to improper authorization, which can allow a user to modify the nickname, username and email of other users without permission.
fixedosv:GHSA-vwg4-846x-f94v
highany0.9.1
usememos/memos Improper Privilege Management vulnerability
Improper Privilege Management in GitHub repository usememos/memos prior to 0.9.1.
fixedosv:GHSA-r3p3-5f35-h6mf
highany0.9.0
usememos/memos Improper Access Control vulnerability
Improper Access Control in GitHub repository usememos/memos prior to 0.9.0.
fixedosv:GHSA-qr52-59r6-49f4
highany0.21.0
memos CORS Misconfiguration in server.go (GHSL-2024-034)
memos is a privacy-first, lightweight note-taking service. A CORS misconfiguration exists in memos 0.20.1 and earlier where an arbitrary origin is reflected with Access-Control-Allow-Credentials set to true. This may allow an attacking website to make a cross-origin request, allowing the attacker to read private information or make privileged changes to the system as the vulnerable user account.
fixedosv:GHSA-p4fx-qf2h-jpmj
highany0.18.2
Memos' Access Tokens Stay Valid after User Password Change
### Summary Access Tokens are used to authenticate application access. When a user changes their password, the existing list of Access Tokens stay valid instead of expiring. If a user finds that their account has been compromised, they can update their password. The bad actor though will still have access to their account because the bad actor's Access Token stays on the list as a valid token. The user will have to manually delete the bad actor's Access Token to secure their account. The list of Access Tokens has a generic Description which makes it hard to pinpoint a bad actor in a list of Access Tokens. ### Details To improve Memos security, all Access Tokens will need to be revoked when a user changes their password. This removes the session for all the user's devices and prompts the user to log in again. You can treat the old Access Tokens as "invalid" because those Access Tokens were created with the older password. ### PoC 1. Have 2 devices on hand 2. Log onto your Memos account on both devices. Notice how Access Tokens are created for each. 3. On one device, successfully change the password. Refresh the page on the 2nd device and notice how it doesn't log out the user. 4. On the 2nd device, change the password again. Refresh the page on the 1st device and notice how it doesn't log out the user. ### Impact A bad actor will still have access to the user's account because the Access Token does not expire on a password update. Having multi-factor authentication will vastly improve account security in Account Takeover cases instead of just relying on a password.
fixedosv:GHSA-mr34-8733-grr2
highany0.25.3
memos vulnerability allows the creation of arbitrary accounts
Incorrect access control in the /api/v1/user endpoint of usememos memos v0.25.2 allows unauthorized attackers to create arbitrary accounts via a crafted request.
fixedosv:GHSA-mg56-wc4q-rw4w
highany0.9.1
usememos/memos Improper Access Control vulnerability
usememos/memos 0.9.0 and prior is vulnerable to Improper Access Control.
fixedosv:GHSA-mfmp-8mqg-q4wm
highany0.9.1
usememos/memos makes Incorrect Use of Privileged APIs
In usememos/memos 0.9.0 and prior, a user with login permission can delete all notes of the whole application via `API DELETE https://demo.usememos.com/api/memo/$idnote`. The vulnerability will lose all user notes data throughout the system, causing damage to user data.
fixedosv:GHSA-ghx2-6v4g-9wmm
highany0.9.0
usememos/memos makes Incorrect Use of Privileged APIs
Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.0.
fixedosv:GHSA-fv6c-rfg3-gvjw
highany\u2014
usememos/memos vulnerable to improper input validation
Improper Input Validation in GitHub repository usememos/memos prior to 0.13.2.
openosv:GHSA-96gq-6ch5-mm54
highany0.9.1
usememos/memos Improper Access Control vulnerability
usememos/memos 0.9.0 and prior is vulnerable to full account takeover via changing user name, email address, and display name.
fixedosv:GHSA-6w5w-wx8w-2cq9
highany\u2014
usememos/memos Cross-Site Request Forgery vulnerability
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior.
openosv:GHSA-5jqp-wmhj-g33f
highany0.13.2
usememos/memos vulnerable to privilege escalation
Improper Privilege Management in GitHub repository usememos/memos prior to 0.13.2.
fixedosv:GHSA-5j6p-59cj-j6cp
highany0.9.1
usememos/memos Denial of Service vulnerability
Denial of Service in GitHub repository usememos/memos 0.9.0 and prior. A patch is available on the `main` branch at commit number f888c628408501daf639de07b90a72ab443b0f4c.
fixedosv:GHSA-33m8-f4hw-wm3q
highany0.15.1
Cross-Site Request Forgery (CSRF) in usememos/memos
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.15.1.
fixedosv:GHSA-2g7r-9xq5-c6hv
mediumany0.25.3
memos vulnerability allows arbitrarily modification or deletion registered identity providers in github.com/usememos/memos
memos vulnerability allows arbitrarily modification or deletion registered identity providers in github.com/usememos/memos
fixedosv:GO-2025-4220
mediumany0.25.3
memos lacks file name validation or verification in github.com/usememos/memos
memos lacks file name validation or verification in github.com/usememos/memos
fixedosv:GO-2025-4218
mediumany0.25.3
memos vulnerability allows the creation of arbitrary accounts in github.com/usememos/memos
memos vulnerability allows the creation of arbitrary accounts in github.com/usememos/memos
fixedosv:GO-2025-4217
mediumany0.25.3
memos vulnerability allows arbitrarily modification or deletion of attachments in github.com/usememos/memos
memos vulnerability allows arbitrarily modification or deletion of attachments in github.com/usememos/memos
fixedosv:GO-2025-4216
mediumany0.25.3
memos vulnerability allows arbitrarily reactions deletion in github.com/usememos/memos
memos vulnerability allows arbitrarily reactions deletion in github.com/usememos/memos
fixedosv:GO-2025-4215
mediumany\u2014
Memos' Access Tokens Stay Valid after User Password Change in github.com/usememos/memos
Memos' Access Tokens Stay Valid after User Password Change in github.com/usememos/memos
openosv:GO-2025-4127
mediumany\u2014
Memos Vulnerable to Stored Cross-Site Scripting in github.com/usememos/memos
Memos Vulnerable to Stored Cross-Site Scripting in github.com/usememos/memos
openosv:GO-2025-3937
mediumany\u2014
Memos Vulnerable to Path Traversal via the CreateResource Endpoint in github.com/usememos/memos
Memos Vulnerable to Path Traversal via the CreateResource Endpoint in github.com/usememos/memos
openosv:GO-2025-3936
mediumany0.24.4
Memos has Cross-Site Scripting (XSS) Vulnerability in Image URLs in github.com/usememos/memos
Memos has Cross-Site Scripting (XSS) Vulnerability in Image URLs in github.com/usememos/memos
fixedosv:GO-2025-3831
mediumany\u2014
Memos Server-Side Request Forgery (SSRF) in github.com/usememos/memos
Memos Server-Side Request Forgery (SSRF) in github.com/usememos/memos
openosv:GO-2025-3492
mediumany0.10.0
Stored XSS using two files in usememos/memos in github.com/usememos/memos
Stored XSS using two files in usememos/memos in github.com/usememos/memos
fixedosv:GO-2024-3274
mediumany0.21.0
memos CORS Misconfiguration in server.go (GHSL-2024-034) in github.com/usememos/memos
memos CORS Misconfiguration in server.go (GHSL-2024-034) in github.com/usememos/memos
fixedosv:GO-2024-3088
mediumany0.22.0
memos vulnerable to Server-Side Request Forgery and Cross-site Scripting in github.com/usememos/memos
memos vulnerable to Server-Side Request Forgery and Cross-site Scripting in github.com/usememos/memos
fixedosv:GO-2024-3049
mediumany0.16.1
memos vulnerable to Server-Side Request Forgery in /o/get/httpmeta in github.com/usememos/memos
memos vulnerable to Server-Side Request Forgery in /o/get/httpmeta in github.com/usememos/memos
fixedosv:GO-2024-3047
mediumany0.22.0
memos vulnerable to Server-Side Request Forgery in /api/resource in github.com/usememos/memos
memos vulnerable to Server-Side Request Forgery in /api/resource in github.com/usememos/memos
fixedosv:GO-2024-3046
mediumany0.15.1
Cross-Site Request Forgery (CSRF) in usememos/memos in github.com/usememos/memos
Cross-Site Request Forgery (CSRF) in usememos/memos in github.com/usememos/memos
fixedosv:GO-2023-2065
mediumany0.13.2
Account TakeOver Due to Improper Handling of JWT Tokens in usememos/memos in github.com/usememos/memos
Account TakeOver Due to Improper Handling of JWT Tokens in usememos/memos in github.com/usememos/memos
fixedosv:GO-2023-2038
mediumany0.13.2
usememos/memos vulnerable to privilege escalation in github.com/usememos/memos
usememos/memos vulnerable to privilege escalation in github.com/usememos/memos
fixedosv:GO-2023-2036
mediumany0.10.4-0.20230211093429-b11d2130a084
Cross site scripting in github.com/usememos/memos
A malicious actor can introduce links starting with a "javascript:" scheme due to insufficient checks on external resources. This can be used as a part of Cross-site Scripting (XSS) attack.
fixedosv:GO-2023-1566
mediumany0.10.0
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
fixedosv:GO-2023-1469
mediumany0.10.0
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
fixedosv:GO-2023-1465
mediumany0.10.0
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
fixedosv:GO-2023-1462
mediumany0.10.0
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
fixedosv:GO-2023-1461
mediumany0.9.1
usememos/memos Improper Privilege Management vulnerability in github.com/usememos/memos
usememos/memos Improper Privilege Management vulnerability in github.com/usememos/memos
fixedosv:GO-2023-1449
mediumany0.9.1
usememos/memos Incorrect Use of Privileged APIs vulnerability in github.com/usememos/memos
usememos/memos Incorrect Use of Privileged APIs vulnerability in github.com/usememos/memos
fixedosv:GO-2023-1292
mediumany0.9.1
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
fixedosv:GO-2023-1291
mediumany0.9.1
sememos/memos vulnerable to Improper Handling of Values in github.com/usememos/memos
sememos/memos vulnerable to Improper Handling of Values in github.com/usememos/memos
fixedosv:GO-2023-1285
mediumany0.9.1
usememos/memos vulnerable to Improper Handling of Insufficient Permissions or Privileges in github.com/usememos/memos
usememos/memos vulnerable to Improper Handling of Insufficient Permissions or Privileges in github.com/usememos/memos
fixedosv:GO-2023-1270
mediumany0.9.1
usememos/memos vulnerable to Improper Verification of Source of a Communication Channel in github.com/usememos/memos
usememos/memos vulnerable to Improper Verification of Source of a Communication Channel in github.com/usememos/memos
fixedosv:GO-2022-1266
mediumany0.9.1
usememos/memos has Incorrectly Specified Destination in a Communication Channel in github.com/usememos/memos
usememos/memos has Incorrectly Specified Destination in a Communication Channel in github.com/usememos/memos
fixedosv:GO-2022-1264
mediumany0.9.1
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1263
mediumany0.9.1
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1261
mediumany0.9.1
usememos/memos vulnerable to Comparison of Object References Instead of Object Contents in github.com/usememos/memos
usememos/memos vulnerable to Comparison of Object References Instead of Object Contents in github.com/usememos/memos
fixedosv:GO-2022-1260
mediumany0.9.1
usememos/memos Improper Authorization vulnerability in github.com/usememos/memos
usememos/memos Improper Authorization vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1259
mediumany0.9.1
usememos/memos Cross-Site Request Forgery vulnerability in github.com/usememos/memos
usememos/memos Cross-Site Request Forgery vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1257
mediumany0.9.1
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1256
mediumany0.9.1
usememos/memos has Insufficient Granularity of Access Control in github.com/usememos/memos
usememos/memos has Insufficient Granularity of Access Control in github.com/usememos/memos
fixedosv:GO-2022-1253
mediumany0.9.1
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1252
mediumany0.9.1
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1251
mediumany0.9.1
usememos/memos Cross-Site Request Forgery vulnerability in github.com/usememos/memos
usememos/memos Cross-Site Request Forgery vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1250
mediumany0.9.1
usememos/memos vulnerable to Improper Authorization in github.com/usememos/memos
usememos/memos vulnerable to Improper Authorization in github.com/usememos/memos
fixedosv:GO-2022-1248
mediumany0.9.1
usememos/memos Improper Authorization vulnerability in github.com/usememos/memos
usememos/memos Improper Authorization vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1245
mediumany0.9.1
usememos/memos vulnerable Improper Restriction of Excessive Authentication Attempts in github.com/usememos/memos
usememos/memos vulnerable Improper Restriction of Excessive Authentication Attempts in github.com/usememos/memos
fixedosv:GO-2022-1244
mediumany0.9.1
usememos/memos Improper Authorization vulnerability in github.com/usememos/memos
usememos/memos Improper Authorization vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1243
mediumany0.9.1
usememos/memos vulnerable to Improper Verification of Source of a Communication Channel in github.com/usememos/memos
usememos/memos vulnerable to Improper Verification of Source of a Communication Channel in github.com/usememos/memos
fixedosv:GO-2022-1240
mediumany0.9.1
usememos/memos Improper Authentication vulnerability in github.com/usememos/memos
usememos/memos Improper Authentication vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1239
mediumany0.9.1
usememos/memos makes Incorrect Use of Privileged APIs in github.com/usememos/memos
usememos/memos makes Incorrect Use of Privileged APIs in github.com/usememos/memos
fixedosv:GO-2022-1236
mediumany0.9.1
usememos/memos has Insufficient Granularity of Access Control in github.com/usememos/memos
usememos/memos has Insufficient Granularity of Access Control in github.com/usememos/memos
fixedosv:GO-2022-1235
mediumany0.9.0
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
fixedosv:GO-2022-1225
mediumany0.9.1
usememos/memos may leak user information to an authenticated user in github.com/usememos/memos
usememos/memos may leak user information to an authenticated user in github.com/usememos/memos
fixedosv:GO-2022-1220
mediumany0.9.1
usememos/memos Denial of Service vulnerability in github.com/usememos/memos
usememos/memos Denial of Service vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1219
mediumany0.9.0
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
usememos/memos Improper Access Control vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1218
mediumany0.9.0
usememos/memos makes Incorrect Use of Privileged APIs in github.com/usememos/memos
usememos/memos makes Incorrect Use of Privileged APIs in github.com/usememos/memos
fixedosv:GO-2022-1217
mediumany0.9.0
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos
fixedosv:GO-2022-1216
mediumany0.9.0
usememos/memos Authorization Bypass Through User-Controlled Key vulnerability in github.com/usememos/memos
usememos/memos Authorization Bypass Through User-Controlled Key vulnerability in github.com/usememos/memos
fixedosv:GO-2022-1215
mediumany0.9.0
usememos/memos vulnerable to improper access control in github.com/usememos/memos
usememos/memos vulnerable to improper access control in github.com/usememos/memos
fixedosv:GO-2022-1205
mediumany0.9.0
usememos/memos missing Secure cookie attribute in github.com/usememos/memos
usememos/memos missing Secure cookie attribute in github.com/usememos/memos
fixedosv:GO-2022-1192
mediumany0.9.0
usememos/memos vulnerable to account takeover due to improper access control in github.com/usememos/memos
usememos/memos vulnerable to account takeover due to improper access control in github.com/usememos/memos
fixedosv:GO-2022-1191
mediumany0.9.0
usememos/memos vulnerable to improper authorization in github.com/usememos/memos
usememos/memos vulnerable to improper authorization in github.com/usememos/memos
fixedosv:GO-2022-1190
mediumany0.9.0
usememos/memos vulnerable to stored cross-site scripting (XSS) in github.com/usememos/memos
usememos/memos vulnerable to stored cross-site scripting (XSS) in github.com/usememos/memos
fixedosv:GO-2022-1189
mediumany0.10.0
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
fixedosv:GHSA-x22v-qgm2-7qc7
mediumany\u2014
Memos Server-Side Request Forgery (SSRF)
elestio memos v0.23.0 is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied URLs, which can be exploited to perform SSRF attacks.
openosv:GHSA-wfxg-v3j4-7qmj
mediumany0.9.1
usememos/memos vulnerable to Improper Verification of Source of a Communication Channel
Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos 0.9.0 and prior.
fixedosv:GHSA-vh43-cc6x-prpr
mediumany0.9.0
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
fixedosv:GHSA-v92p-phmp-xffr
mediumany0.9.1
usememos/memos vulnerable to Improper Authorization
usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization.
fixedosv:GHSA-rx2m-xr4x-54hh
mediumany0.9.1
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
fixedosv:GHSA-rmhx-9h5h-3xh3
mediumany\u2014
Memos Cross-site Scripting vulnerability
Memos, an open-source, self-hosted memo hub, is vulnerable to stored Cross-site Scripting (XSS) in versions 0.8.3 and prior. A patch is available and anticipated to be part of version 0.9.0.
openosv:GHSA-rgj5-jj5q-v3v7
mediumany0.9.1
usememos/memos has Incorrectly Specified Destination in a Communication Channel
Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos 0.9.0 and prior.
fixedosv:GHSA-r7hg-2cpp-8wqq
mediumany0.9.1
usememos/memos Improper Authorization vulnerability
usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization.
fixedosv:GHSA-qw36-rw5q-gxcq
mediumany0.9.1
usememos/memos vulnerable Improper Restriction of Excessive Authentication Attempts
In usememos/memos 0.9.0 and prior, an attacker can delete other users' posts via post id, which can be done via brute force.
fixedosv:GHSA-qrrf-xvcf-p64q
mediumany0.25.3
memos lacks file name validation or verification
A lack of file name validation or verification in the Attachment service of usememos memos v0.25.2 allows attackers to execute a path traversal.
fixedosv:GHSA-qgjp-5g5x-vhq2
mediumany0.9.1
usememos/memos Improper Access Control vulnerability
In usememos/memos 0.9.0 and prior, a user can view any content from private memos from other users via the API.
fixedosv:GHSA-qf9q-3wwx-8qjv
mediumany0.9.0
usememos/memos missing Secure cookie attribute
usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos prior to 0.9.0 is missing the Secure cookie attribute, making it vulnerable to session hijacking.
fixedosv:GHSA-qcw2-492v-57xj
mediumany0.9.1
usememos/memos Improper Authorization vulnerability
usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization.
fixedosv:GHSA-qcf5-m2c6-89f2
mediumany0.9.1
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior.
fixedosv:GHSA-pwhr-p68w-296x
mediumany0.9.1
usememos/memos Improper Access Control vulnerability
An Improper Access Control vulnerability in usememos/memos 0.9.0 and prior can result in a user deleting others' public and private memos.
fixedosv:GHSA-pp3p-6jjh-rmg7
mediumany0.10.0
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
fixedosv:GHSA-pcvh-px2p-vmxw
mediumany0.9.1
usememos/memos Incorrect Use of Privileged APIs vulnerability
In usememos/memos 0.9.0 and prior, a user can archive any private memos, delete any shortcut, and edit any shortcut from other users via API.
fixedosv:GHSA-mq5q-gpgv-pwxw
mediumany0.9.1
usememos/memos vulnerable to Improper Verification of Source of a Communication Channel
usememos/memos 0.9.0 and prior is vulnerable to Improper Verification of Source of a Communication Channel.
fixedosv:GHSA-mfvq-m3jj-8864
mediumany0.9.1
usememos/memos vulnerable to Comparison of Object References Instead of Object Contents
Comparison of Object References Instead of Object Contents in GitHub repository usememos/memos 0.9.0 and prior.
fixedosv:GHSA-m5pr-wm6q-x4g2
mediumany0.9.1
usememos/memos Improper Authentication vulnerability
usememos/memos 0.9.0 and prior is vulnerable to Improper Authentication.
fixedosv:GHSA-jvq8-w7qv-hqp6
mediumany0.9.1
usememos/memos may leak user information to an authenticated user
usememos/memos 0.9.0 and prior has endpoint that leaks user information like names, email, role, and OpenID to an authenticated user. A patch is available at commit 05b41804e33a34102f1f75bb2d69195dda6a1210 on the `main` branch.
fixedosv:GHSA-j593-h5v3-45x6
mediumany0.24.4
Memos has Cross-Site Scripting (XSS) Vulnerability in Image URLs
The Memos application, up to version v0.24.3, allows for the embedding of markdown images with arbitrary URLs. When a user views a memo containing such an image, their browser automatically fetches the image URL without explicit user consent or interaction beyond viewing the memo. This can be exploited by an attacker to disclose the viewing user's IP address, browser User-Agent string, and potentially other request-specific information to the attacker-controlled server, leading to information disclosure and user tracking.
fixedosv:GHSA-hfcf-79gh-f3jc
mediumany0.9.1
usememos/memos Improper Authorization vulnerability
In usememos/memos 0.9.0 and prior, an unauthorized user can access any private memo by URL hacking a memo on the editing screen.
fixedosv:GHSA-hc5q-26h8-r9wf
mediumany0.10.0
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
fixedosv:GHSA-h2ph-9r76-37v5
mediumany0.9.1
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior.
fixedosv:GHSA-gxqf-4g4p-q3hc
mediumany0.9.1
usememos/memos Cross-Site Request Forgery vulnerability
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1
fixedosv:GHSA-gw9m-2m5v-c6x5
mediumany0.9.1
usememos/memos Improper Access Control vulnerability
In usememos/memos 0.9.0 and prior, users can edit and delete all other users' shortcuts.
fixedosv:GHSA-gfj4-wg89-m22r
mediumany0.10.0
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
fixedosv:GHSA-fpjc-cxr6-w6h8
mediumany0.9.1
usememos/memos has Insufficient Granularity of Access Control
usememos/memos 0.9.0 and prior allows an attacker to archive any user's public or private post.
fixedosv:GHSA-f83p-pg86-p922
mediumany0.9.0
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
fixedosv:GHSA-f552-97qx-c694
mediumany\u2014
usememos/memos Cross-Site Request Forgery vulnerability
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior.
openosv:GHSA-cwrm-33qq-4w2x
mediumany\u2014
Memos Vulnerable to Stored Cross-Site Scripting
Memos 0.22 is vulnerable to Stored Cross site scripting (XSS) vulnerabilities by the upload attachment and user avatar features. Memos does not verify the content type of the uploaded data and serve it back as is. An authenticated attacker can use this to elevate their privileges when the stored XSS is viewed by an admin.
openosv:GHSA-cgrg-86m5-xm4w
mediumany0.9.0
usememos/memos vulnerable to stored cross-site scripting (XSS)
usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos prior to 0.9.0 has a feature to upload file and display it, and by uploading a crafted SVG file, an attacker could perform a stored cross-site scripting attack with the image direct link. This was patched in version 0.9.0.
fixedosv:GHSA-c8jh-vcjh-fx2w
mediumany\u2014
usememos/memos Cross-Site Request Forgery vulnerability
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior.
openosv:GHSA-c5hq-35h7-r9x4
mediumany0.9.0
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
fixedosv:GHSA-c2v4-8r9g-g5xj
mediumany0.10.4-0.20230211093429-b11d2130a084
Cross Site Scripting in usememos/memos
All versions of the package github.com/usememos/memos/server prior to 0.11.0 are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.
fixedosv:GHSA-9w8x-5hv5-r6gw
mediumany0.9.0
usememos/memos vulnerable to improper access control
Improper Access Control in GitHub repository usememos/memos prior to 0.9.0.
fixedosv:GHSA-9v48-2h5x-fvpm
mediumany0.10.0
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
fixedosv:GHSA-9h7x-9pmh-7gg8
mediumany0.22.0
memos vulnerable to Server-Side Request Forgery and Cross-site Scripting
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the `/o/get/image` that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability. Version 0.22.0 of memos removes the vulnerable file.
fixedosv:GHSA-9cqm-mgv9-vv9j
mediumany0.25.3
memos vulnerability allows arbitrarily modification or deletion registered identity providers
Incorrect access control in the Identity Provider service of usememos memos v0.25.2 allows attackers with low-level privileges to arbitrarily modify or delete registered identity providers, leading to an account takeover or Denial of Service (DoS).
fixedosv:GHSA-99m2-qwx6-2w6f
mediumany0.9.0
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
fixedosv:GHSA-97rc-mm5j-f6rj
mediumany0.25.3
memos vulnerability allows arbitrarily modification or deletion of attachments
Incorrect access control in usememos memos v0.25.2 allows attackers with low-level privileges to arbitrarily modify or delete attachments made by other users.
fixedosv:GHSA-8p44-g572-557h
mediumany0.25.3
memos vulnerability allows arbitrarily reactions deletion
Incorrect access control in usememos memos v0.25.2 allows attackers with low-level privileges to arbitrarily delete reactions made to other users' Memos.
fixedosv:GHSA-8jcj-g9f4-qx42
mediumany0.10.0
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
fixedosv:GHSA-8686-4cr3-76wj
mediumany0.9.1
usememos/memos has Insufficient Granularity of Access Control
An Insufficient Granularity of Access Control in usememos/memos prior to 0.9.0 can allow an attacker to delete a memo from the archives.
fixedosv:GHSA-7qpw-2j9m-rw8c
mediumany\u2014
Memos Vulnerable to Path Traversal via the CreateResource Endpoint
When Memos 0.22 is configured to store objects locally, an attacker can create a file via the CreateResource endpoint containing a path traversal sequence in the name, allowing arbitrary file write on the server.
openosv:GHSA-78j5-8vq7-jxv5
mediumany0.9.1
usememos/memos vulnerable to Improper Handling of Insufficient Permissions or Privileges
Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1.
fixedosv:GHSA-6whj-8g9g-5jvx
mediumany0.9.1
usememos/memos Improper Access Control vulnerability
Improper Access Control in GitHub repository usememos/memos 0.9.0 and prior.
fixedosv:GHSA-6fx9-29x2-fmfj
mediumany0.16.1
memos vulnerable to Server-Side Request Forgery in /o/get/httpmeta
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/httpmeta that allows unauthenticated users to enumerate the internal network and receive limited html values in json form. This vulnerability is fixed in 0.16.1.
fixedosv:GHSA-6fcf-g3mp-xj2x
mediumany0.22.0
memos vulnerable to Server-Side Request Forgery in /api/resource
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the `/api/resource` that allows authenticated users to enumerate the internal network. Version 0.22.0 of memos removes the vulnerable file.
fixedosv:GHSA-65fm-2jgr-j7qq
mediumany0.9.1
usememos/memos Cross-Site Request Forgery vulnerability
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior.
fixedosv:GHSA-642q-2q68-9j3p
mediumany0.10.0
Stored XSS using two files in usememos/memos
A stored cross-site scripting (XSS) vulnerability was discovered in usememos/memos version 0.9.1. This vulnerability allows an attacker to upload a JavaScript file containing a malicious script and reference it in an HTML file. When the HTML file is accessed, the malicious script is executed. This can lead to the theft of sensitive information, such as login credentials, from users visiting the affected website. The issue has been fixed in version 0.10.0.
fixedosv:GHSA-5r2g-59px-3q9w
mediumany0.9.1
sememos/memos vulnerable to Improper Handling of Values
In usememos/memos 0.9.0 and prior, an attacker can post malicious content to another user's memos page via POST request.
fixedosv:GHSA-42q2-m54f-jh95
criticalany0.9.1
usememos/memos vulnerable to Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
fixedosv:GHSA-x9p9-v3x6-68mq
criticalany0.13.2
Account TakeOver Due to Improper Handling of JWT Tokens in usememos/memos
Improper Access Control in GitHub repository usememos/memos prior to 0.13.2. As of commit `c9aa2eeb9` access tokens which fail validation are rejected.
fixedosv:GHSA-j2gj-g3p9-7mrr
criticalany0.9.1
usememos/memos Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
fixedosv:GHSA-8w5q-5fpq-v4pm
criticalany0.9.0
usememos/memos Authorization Bypass Through User-Controlled Key vulnerability
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.0.
fixedosv:GHSA-68gw-r2x5-7r5r
API access

Get this data programmatically \u2014 free, no authentication.

curl https://depscope.dev/api/bugs/go/github.com/usememos/memos