github.com/usememos/memos known bugs
go134 known bugs in github.com/usememos/memos, with affected versions, fixes and workarounds. Sourced from upstream issue trackers.
134
bugs
Known bugs
| Severity | Affected | Fixed in | Title | Status | Source |
|---|---|---|---|---|---|
| high | any | 0.9.0 | usememos/memos vulnerable to account takeover due to improper access control usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Versions prior to 0.9.0 improperly maintain access control allowing an attacker to take over an account by changing header values in the HTTP request. | fixed | osv:GHSA-w57v-6xp4-rm2v |
| high | any | 0.9.0 | usememos/memos vulnerable to improper authorization usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos versions prior to 0.9.0 are vulnerable to improper authorization, which can allow a user to modify the nickname, username and email of other users without permission. | fixed | osv:GHSA-vwg4-846x-f94v |
| high | any | 0.9.1 | usememos/memos Improper Privilege Management vulnerability Improper Privilege Management in GitHub repository usememos/memos prior to 0.9.1. | fixed | osv:GHSA-r3p3-5f35-h6mf |
| high | any | 0.9.0 | usememos/memos Improper Access Control vulnerability Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. | fixed | osv:GHSA-qr52-59r6-49f4 |
| high | any | 0.21.0 | memos CORS Misconfiguration in server.go (GHSL-2024-034) memos is a privacy-first, lightweight note-taking service. A CORS misconfiguration exists in memos 0.20.1 and earlier where an arbitrary origin is reflected with Access-Control-Allow-Credentials set to true. This may allow an attacking website to make a cross-origin request, allowing the attacker to read private information or make privileged changes to the system as the vulnerable user account. | fixed | osv:GHSA-p4fx-qf2h-jpmj |
| high | any | 0.18.2 | Memos' Access Tokens Stay Valid after User Password Change ### Summary
Access Tokens are used to authenticate application access. When a user changes their password, the existing list of Access Tokens stay valid instead of expiring. If a user finds that their account has been compromised, they can update their password.
The bad actor though will still have access to their account because the bad actor's Access Token stays on the list as a valid token. The user will have to manually delete the bad actor's Access Token to secure their account. The list of Access Tokens has a generic Description which makes it hard to pinpoint a bad actor in a list of Access Tokens.
### Details
To improve Memos security, all Access Tokens will need to be revoked when a user changes their password. This removes the session for all the user's devices and prompts the user to log in again. You can treat the old Access Tokens as "invalid" because those Access Tokens were created with the older password.
### PoC
1. Have 2 devices on hand
2. Log onto your Memos account on both devices. Notice how Access Tokens are created for each.
3. On one device, successfully change the password. Refresh the page on the 2nd device and notice how it doesn't log out the user.
4. On the 2nd device, change the password again. Refresh the page on the 1st device and notice how it doesn't log out the user.
### Impact
A bad actor will still have access to the user's account because the Access Token does not expire on a password update. Having multi-factor authentication will vastly improve account security in Account Takeover cases instead of just relying on a password. | fixed | osv:GHSA-mr34-8733-grr2 |
| high | any | 0.25.3 | memos vulnerability allows the creation of arbitrary accounts Incorrect access control in the /api/v1/user endpoint of usememos memos v0.25.2 allows unauthorized attackers to create arbitrary accounts via a crafted request. | fixed | osv:GHSA-mg56-wc4q-rw4w |
| high | any | 0.9.1 | usememos/memos Improper Access Control vulnerability usememos/memos 0.9.0 and prior is vulnerable to Improper Access Control. | fixed | osv:GHSA-mfmp-8mqg-q4wm |
| high | any | 0.9.1 | usememos/memos makes Incorrect Use of Privileged APIs In usememos/memos 0.9.0 and prior, a user with login permission can delete all notes of the whole application via `API DELETE https://demo.usememos.com/api/memo/$idnote`. The vulnerability will lose all user notes data throughout the system, causing damage to user data. | fixed | osv:GHSA-ghx2-6v4g-9wmm |
| high | any | 0.9.0 | usememos/memos makes Incorrect Use of Privileged APIs Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.0. | fixed | osv:GHSA-fv6c-rfg3-gvjw |
| high | any | \u2014 | usememos/memos vulnerable to improper input validation Improper Input Validation in GitHub repository usememos/memos prior to 0.13.2. | open | osv:GHSA-96gq-6ch5-mm54 |
| high | any | 0.9.1 | usememos/memos Improper Access Control vulnerability usememos/memos 0.9.0 and prior is vulnerable to full account takeover via changing user name, email address, and display name. | fixed | osv:GHSA-6w5w-wx8w-2cq9 |
| high | any | \u2014 | usememos/memos Cross-Site Request Forgery vulnerability Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior. | open | osv:GHSA-5jqp-wmhj-g33f |
| high | any | 0.13.2 | usememos/memos vulnerable to privilege escalation Improper Privilege Management in GitHub repository usememos/memos prior to 0.13.2. | fixed | osv:GHSA-5j6p-59cj-j6cp |
| high | any | 0.9.1 | usememos/memos Denial of Service vulnerability Denial of Service in GitHub repository usememos/memos 0.9.0 and prior. A patch is available on the `main` branch at commit number f888c628408501daf639de07b90a72ab443b0f4c. | fixed | osv:GHSA-33m8-f4hw-wm3q |
| high | any | 0.15.1 | Cross-Site Request Forgery (CSRF) in usememos/memos Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.15.1. | fixed | osv:GHSA-2g7r-9xq5-c6hv |
| medium | any | 0.25.3 | memos vulnerability allows arbitrarily modification or deletion registered identity providers in github.com/usememos/memos memos vulnerability allows arbitrarily modification or deletion registered identity providers in github.com/usememos/memos | fixed | osv:GO-2025-4220 |
| medium | any | 0.25.3 | memos lacks file name validation or verification in github.com/usememos/memos memos lacks file name validation or verification in github.com/usememos/memos | fixed | osv:GO-2025-4218 |
| medium | any | 0.25.3 | memos vulnerability allows the creation of arbitrary accounts in github.com/usememos/memos memos vulnerability allows the creation of arbitrary accounts in github.com/usememos/memos | fixed | osv:GO-2025-4217 |
| medium | any | 0.25.3 | memos vulnerability allows arbitrarily modification or deletion of attachments in github.com/usememos/memos memos vulnerability allows arbitrarily modification or deletion of attachments in github.com/usememos/memos | fixed | osv:GO-2025-4216 |
| medium | any | 0.25.3 | memos vulnerability allows arbitrarily reactions deletion in github.com/usememos/memos memos vulnerability allows arbitrarily reactions deletion in github.com/usememos/memos | fixed | osv:GO-2025-4215 |
| medium | any | \u2014 | Memos' Access Tokens Stay Valid after User Password Change in github.com/usememos/memos Memos' Access Tokens Stay Valid after User Password Change in github.com/usememos/memos | open | osv:GO-2025-4127 |
| medium | any | \u2014 | Memos Vulnerable to Stored Cross-Site Scripting in github.com/usememos/memos Memos Vulnerable to Stored Cross-Site Scripting in github.com/usememos/memos | open | osv:GO-2025-3937 |
| medium | any | \u2014 | Memos Vulnerable to Path Traversal via the CreateResource Endpoint in github.com/usememos/memos Memos Vulnerable to Path Traversal via the CreateResource Endpoint in github.com/usememos/memos | open | osv:GO-2025-3936 |
| medium | any | 0.24.4 | Memos has Cross-Site Scripting (XSS) Vulnerability in Image URLs in github.com/usememos/memos Memos has Cross-Site Scripting (XSS) Vulnerability in Image URLs in github.com/usememos/memos | fixed | osv:GO-2025-3831 |
| medium | any | \u2014 | Memos Server-Side Request Forgery (SSRF) in github.com/usememos/memos Memos Server-Side Request Forgery (SSRF) in github.com/usememos/memos | open | osv:GO-2025-3492 |
| medium | any | 0.10.0 | Stored XSS using two files in usememos/memos in github.com/usememos/memos Stored XSS using two files in usememos/memos in github.com/usememos/memos | fixed | osv:GO-2024-3274 |
| medium | any | 0.21.0 | memos CORS Misconfiguration in server.go (GHSL-2024-034) in github.com/usememos/memos memos CORS Misconfiguration in server.go (GHSL-2024-034) in github.com/usememos/memos | fixed | osv:GO-2024-3088 |
| medium | any | 0.22.0 | memos vulnerable to Server-Side Request Forgery and Cross-site Scripting in github.com/usememos/memos memos vulnerable to Server-Side Request Forgery and Cross-site Scripting in github.com/usememos/memos | fixed | osv:GO-2024-3049 |
| medium | any | 0.16.1 | memos vulnerable to Server-Side Request Forgery in /o/get/httpmeta in github.com/usememos/memos memos vulnerable to Server-Side Request Forgery in /o/get/httpmeta in github.com/usememos/memos | fixed | osv:GO-2024-3047 |
| medium | any | 0.22.0 | memos vulnerable to Server-Side Request Forgery in /api/resource in github.com/usememos/memos memos vulnerable to Server-Side Request Forgery in /api/resource in github.com/usememos/memos | fixed | osv:GO-2024-3046 |
| medium | any | 0.15.1 | Cross-Site Request Forgery (CSRF) in usememos/memos in github.com/usememos/memos Cross-Site Request Forgery (CSRF) in usememos/memos in github.com/usememos/memos | fixed | osv:GO-2023-2065 |
| medium | any | 0.13.2 | Account TakeOver Due to Improper Handling of JWT Tokens in usememos/memos in github.com/usememos/memos Account TakeOver Due to Improper Handling of JWT Tokens in usememos/memos in github.com/usememos/memos | fixed | osv:GO-2023-2038 |
| medium | any | 0.13.2 | usememos/memos vulnerable to privilege escalation in github.com/usememos/memos usememos/memos vulnerable to privilege escalation in github.com/usememos/memos | fixed | osv:GO-2023-2036 |
| medium | any | 0.10.4-0.20230211093429-b11d2130a084 | Cross site scripting in github.com/usememos/memos A malicious actor can introduce links starting with a "javascript:" scheme due to insufficient checks on external resources. This can be used as a part of Cross-site Scripting (XSS) attack. | fixed | osv:GO-2023-1566 |
| medium | any | 0.10.0 | usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos | fixed | osv:GO-2023-1469 |
| medium | any | 0.10.0 | usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos | fixed | osv:GO-2023-1465 |
| medium | any | 0.10.0 | usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos | fixed | osv:GO-2023-1462 |
| medium | any | 0.10.0 | usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos | fixed | osv:GO-2023-1461 |
| medium | any | 0.9.1 | usememos/memos Improper Privilege Management vulnerability in github.com/usememos/memos usememos/memos Improper Privilege Management vulnerability in github.com/usememos/memos | fixed | osv:GO-2023-1449 |
| medium | any | 0.9.1 | usememos/memos Incorrect Use of Privileged APIs vulnerability in github.com/usememos/memos usememos/memos Incorrect Use of Privileged APIs vulnerability in github.com/usememos/memos | fixed | osv:GO-2023-1292 |
| medium | any | 0.9.1 | usememos/memos Improper Access Control vulnerability in github.com/usememos/memos usememos/memos Improper Access Control vulnerability in github.com/usememos/memos | fixed | osv:GO-2023-1291 |
| medium | any | 0.9.1 | sememos/memos vulnerable to Improper Handling of Values in github.com/usememos/memos sememos/memos vulnerable to Improper Handling of Values in github.com/usememos/memos | fixed | osv:GO-2023-1285 |
| medium | any | 0.9.1 | usememos/memos vulnerable to Improper Handling of Insufficient Permissions or Privileges in github.com/usememos/memos usememos/memos vulnerable to Improper Handling of Insufficient Permissions or Privileges in github.com/usememos/memos | fixed | osv:GO-2023-1270 |
| medium | any | 0.9.1 | usememos/memos vulnerable to Improper Verification of Source of a Communication Channel in github.com/usememos/memos usememos/memos vulnerable to Improper Verification of Source of a Communication Channel in github.com/usememos/memos | fixed | osv:GO-2022-1266 |
| medium | any | 0.9.1 | usememos/memos has Incorrectly Specified Destination in a Communication Channel in github.com/usememos/memos usememos/memos has Incorrectly Specified Destination in a Communication Channel in github.com/usememos/memos | fixed | osv:GO-2022-1264 |
| medium | any | 0.9.1 | usememos/memos Improper Access Control vulnerability in github.com/usememos/memos usememos/memos Improper Access Control vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1263 |
| medium | any | 0.9.1 | usememos/memos Improper Access Control vulnerability in github.com/usememos/memos usememos/memos Improper Access Control vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1261 |
| medium | any | 0.9.1 | usememos/memos vulnerable to Comparison of Object References Instead of Object Contents in github.com/usememos/memos usememos/memos vulnerable to Comparison of Object References Instead of Object Contents in github.com/usememos/memos | fixed | osv:GO-2022-1260 |
| medium | any | 0.9.1 | usememos/memos Improper Authorization vulnerability in github.com/usememos/memos usememos/memos Improper Authorization vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1259 |
| medium | any | 0.9.1 | usememos/memos Cross-Site Request Forgery vulnerability in github.com/usememos/memos usememos/memos Cross-Site Request Forgery vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1257 |
| medium | any | 0.9.1 | usememos/memos Improper Access Control vulnerability in github.com/usememos/memos usememos/memos Improper Access Control vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1256 |
| medium | any | 0.9.1 | usememos/memos has Insufficient Granularity of Access Control in github.com/usememos/memos usememos/memos has Insufficient Granularity of Access Control in github.com/usememos/memos | fixed | osv:GO-2022-1253 |
| medium | any | 0.9.1 | usememos/memos Improper Access Control vulnerability in github.com/usememos/memos usememos/memos Improper Access Control vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1252 |
| medium | any | 0.9.1 | usememos/memos Improper Access Control vulnerability in github.com/usememos/memos usememos/memos Improper Access Control vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1251 |
| medium | any | 0.9.1 | usememos/memos Cross-Site Request Forgery vulnerability in github.com/usememos/memos usememos/memos Cross-Site Request Forgery vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1250 |
| medium | any | 0.9.1 | usememos/memos vulnerable to Improper Authorization in github.com/usememos/memos usememos/memos vulnerable to Improper Authorization in github.com/usememos/memos | fixed | osv:GO-2022-1248 |
| medium | any | 0.9.1 | usememos/memos Improper Authorization vulnerability in github.com/usememos/memos usememos/memos Improper Authorization vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1245 |
| medium | any | 0.9.1 | usememos/memos vulnerable Improper Restriction of Excessive Authentication Attempts in github.com/usememos/memos usememos/memos vulnerable Improper Restriction of Excessive Authentication Attempts in github.com/usememos/memos | fixed | osv:GO-2022-1244 |
| medium | any | 0.9.1 | usememos/memos Improper Authorization vulnerability in github.com/usememos/memos usememos/memos Improper Authorization vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1243 |
| medium | any | 0.9.1 | usememos/memos vulnerable to Improper Verification of Source of a Communication Channel in github.com/usememos/memos usememos/memos vulnerable to Improper Verification of Source of a Communication Channel in github.com/usememos/memos | fixed | osv:GO-2022-1240 |
| medium | any | 0.9.1 | usememos/memos Improper Authentication vulnerability in github.com/usememos/memos usememos/memos Improper Authentication vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1239 |
| medium | any | 0.9.1 | usememos/memos makes Incorrect Use of Privileged APIs in github.com/usememos/memos usememos/memos makes Incorrect Use of Privileged APIs in github.com/usememos/memos | fixed | osv:GO-2022-1236 |
| medium | any | 0.9.1 | usememos/memos has Insufficient Granularity of Access Control in github.com/usememos/memos usememos/memos has Insufficient Granularity of Access Control in github.com/usememos/memos | fixed | osv:GO-2022-1235 |
| medium | any | 0.9.0 | usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos | fixed | osv:GO-2022-1225 |
| medium | any | 0.9.1 | usememos/memos may leak user information to an authenticated user in github.com/usememos/memos usememos/memos may leak user information to an authenticated user in github.com/usememos/memos | fixed | osv:GO-2022-1220 |
| medium | any | 0.9.1 | usememos/memos Denial of Service vulnerability in github.com/usememos/memos usememos/memos Denial of Service vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1219 |
| medium | any | 0.9.0 | usememos/memos Improper Access Control vulnerability in github.com/usememos/memos usememos/memos Improper Access Control vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1218 |
| medium | any | 0.9.0 | usememos/memos makes Incorrect Use of Privileged APIs in github.com/usememos/memos usememos/memos makes Incorrect Use of Privileged APIs in github.com/usememos/memos | fixed | osv:GO-2022-1217 |
| medium | any | 0.9.0 | usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos usememos/memos vulnerable to stored Cross-site Scripting in github.com/usememos/memos | fixed | osv:GO-2022-1216 |
| medium | any | 0.9.0 | usememos/memos Authorization Bypass Through User-Controlled Key vulnerability in github.com/usememos/memos usememos/memos Authorization Bypass Through User-Controlled Key vulnerability in github.com/usememos/memos | fixed | osv:GO-2022-1215 |
| medium | any | 0.9.0 | usememos/memos vulnerable to improper access control in github.com/usememos/memos usememos/memos vulnerable to improper access control in github.com/usememos/memos | fixed | osv:GO-2022-1205 |
| medium | any | 0.9.0 | usememos/memos missing Secure cookie attribute in github.com/usememos/memos usememos/memos missing Secure cookie attribute in github.com/usememos/memos | fixed | osv:GO-2022-1192 |
| medium | any | 0.9.0 | usememos/memos vulnerable to account takeover due to improper access control in github.com/usememos/memos usememos/memos vulnerable to account takeover due to improper access control in github.com/usememos/memos | fixed | osv:GO-2022-1191 |
| medium | any | 0.9.0 | usememos/memos vulnerable to improper authorization in github.com/usememos/memos usememos/memos vulnerable to improper authorization in github.com/usememos/memos | fixed | osv:GO-2022-1190 |
| medium | any | 0.9.0 | usememos/memos vulnerable to stored cross-site scripting (XSS) in github.com/usememos/memos usememos/memos vulnerable to stored cross-site scripting (XSS) in github.com/usememos/memos | fixed | osv:GO-2022-1189 |
| medium | any | 0.10.0 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | fixed | osv:GHSA-x22v-qgm2-7qc7 |
| medium | any | \u2014 | Memos Server-Side Request Forgery (SSRF) elestio memos v0.23.0 is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied URLs, which can be exploited to perform SSRF attacks. | open | osv:GHSA-wfxg-v3j4-7qmj |
| medium | any | 0.9.1 | usememos/memos vulnerable to Improper Verification of Source of a Communication Channel Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos 0.9.0 and prior. | fixed | osv:GHSA-vh43-cc6x-prpr |
| medium | any | 0.9.0 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | fixed | osv:GHSA-v92p-phmp-xffr |
| medium | any | 0.9.1 | usememos/memos vulnerable to Improper Authorization usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization. | fixed | osv:GHSA-rx2m-xr4x-54hh |
| medium | any | 0.9.1 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1. | fixed | osv:GHSA-rmhx-9h5h-3xh3 |
| medium | any | \u2014 | Memos Cross-site Scripting vulnerability Memos, an open-source, self-hosted memo hub, is vulnerable to stored Cross-site Scripting (XSS) in versions 0.8.3 and prior. A patch is available and anticipated to be part of version 0.9.0. | open | osv:GHSA-rgj5-jj5q-v3v7 |
| medium | any | 0.9.1 | usememos/memos has Incorrectly Specified Destination in a Communication Channel Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos 0.9.0 and prior. | fixed | osv:GHSA-r7hg-2cpp-8wqq |
| medium | any | 0.9.1 | usememos/memos Improper Authorization vulnerability usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization. | fixed | osv:GHSA-qw36-rw5q-gxcq |
| medium | any | 0.9.1 | usememos/memos vulnerable Improper Restriction of Excessive Authentication Attempts In usememos/memos 0.9.0 and prior, an attacker can delete other users' posts via post id, which can be done via brute force. | fixed | osv:GHSA-qrrf-xvcf-p64q |
| medium | any | 0.25.3 | memos lacks file name validation or verification A lack of file name validation or verification in the Attachment service of usememos memos v0.25.2 allows attackers to execute a path traversal. | fixed | osv:GHSA-qgjp-5g5x-vhq2 |
| medium | any | 0.9.1 | usememos/memos Improper Access Control vulnerability In usememos/memos 0.9.0 and prior, a user can view any content from private memos from other users via the API. | fixed | osv:GHSA-qf9q-3wwx-8qjv |
| medium | any | 0.9.0 | usememos/memos missing Secure cookie attribute usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos prior to 0.9.0 is missing the Secure cookie attribute, making it vulnerable to session hijacking.
| fixed | osv:GHSA-qcw2-492v-57xj |
| medium | any | 0.9.1 | usememos/memos Improper Authorization vulnerability usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization. | fixed | osv:GHSA-qcf5-m2c6-89f2 |
| medium | any | 0.9.1 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior. | fixed | osv:GHSA-pwhr-p68w-296x |
| medium | any | 0.9.1 | usememos/memos Improper Access Control vulnerability An Improper Access Control vulnerability in usememos/memos 0.9.0 and prior can result in a user deleting others' public and private memos. | fixed | osv:GHSA-pp3p-6jjh-rmg7 |
| medium | any | 0.10.0 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | fixed | osv:GHSA-pcvh-px2p-vmxw |
| medium | any | 0.9.1 | usememos/memos Incorrect Use of Privileged APIs vulnerability In usememos/memos 0.9.0 and prior, a user can archive any private memos, delete any shortcut, and edit any shortcut from other users via API. | fixed | osv:GHSA-mq5q-gpgv-pwxw |
| medium | any | 0.9.1 | usememos/memos vulnerable to Improper Verification of Source of a Communication Channel usememos/memos 0.9.0 and prior is vulnerable to Improper Verification of Source of a Communication Channel. | fixed | osv:GHSA-mfvq-m3jj-8864 |
| medium | any | 0.9.1 | usememos/memos vulnerable to Comparison of Object References Instead of Object Contents Comparison of Object References Instead of Object Contents in GitHub repository usememos/memos 0.9.0 and prior. | fixed | osv:GHSA-m5pr-wm6q-x4g2 |
| medium | any | 0.9.1 | usememos/memos Improper Authentication vulnerability usememos/memos 0.9.0 and prior is vulnerable to Improper Authentication. | fixed | osv:GHSA-jvq8-w7qv-hqp6 |
| medium | any | 0.9.1 | usememos/memos may leak user information to an authenticated user usememos/memos 0.9.0 and prior has endpoint that leaks user information like names, email, role, and OpenID to an authenticated user. A patch is available at commit 05b41804e33a34102f1f75bb2d69195dda6a1210 on the `main` branch. | fixed | osv:GHSA-j593-h5v3-45x6 |
| medium | any | 0.24.4 | Memos has Cross-Site Scripting (XSS) Vulnerability in Image URLs The Memos application, up to version v0.24.3, allows for the embedding of markdown images with arbitrary URLs. When a user views a memo containing such an image, their browser automatically fetches the image URL without explicit user consent or interaction beyond viewing the memo. This can be exploited by an attacker to disclose the viewing user's IP address, browser User-Agent string, and potentially other request-specific information to the attacker-controlled server, leading to information disclosure and user tracking. | fixed | osv:GHSA-hfcf-79gh-f3jc |
| medium | any | 0.9.1 | usememos/memos Improper Authorization vulnerability In usememos/memos 0.9.0 and prior, an unauthorized user can access any private memo by URL hacking a memo on the editing screen. | fixed | osv:GHSA-hc5q-26h8-r9wf |
| medium | any | 0.10.0 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | fixed | osv:GHSA-h2ph-9r76-37v5 |
| medium | any | 0.9.1 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior. | fixed | osv:GHSA-gxqf-4g4p-q3hc |
| medium | any | 0.9.1 | usememos/memos Cross-Site Request Forgery vulnerability Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1 | fixed | osv:GHSA-gw9m-2m5v-c6x5 |
| medium | any | 0.9.1 | usememos/memos Improper Access Control vulnerability In usememos/memos 0.9.0 and prior, users can edit and delete all other users' shortcuts. | fixed | osv:GHSA-gfj4-wg89-m22r |
| medium | any | 0.10.0 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | fixed | osv:GHSA-fpjc-cxr6-w6h8 |
| medium | any | 0.9.1 | usememos/memos has Insufficient Granularity of Access Control usememos/memos 0.9.0 and prior allows an attacker to archive any user's public or private post. | fixed | osv:GHSA-f83p-pg86-p922 |
| medium | any | 0.9.0 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | fixed | osv:GHSA-f552-97qx-c694 |
| medium | any | \u2014 | usememos/memos Cross-Site Request Forgery vulnerability Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior. | open | osv:GHSA-cwrm-33qq-4w2x |
| medium | any | \u2014 | Memos Vulnerable to Stored Cross-Site Scripting Memos 0.22 is vulnerable to Stored Cross site scripting (XSS) vulnerabilities by the upload attachment and user avatar features. Memos does not verify the content type of the uploaded data and serve it back as is. An authenticated attacker can use this to elevate their privileges when the stored XSS is viewed by an admin. | open | osv:GHSA-cgrg-86m5-xm4w |
| medium | any | 0.9.0 | usememos/memos vulnerable to stored cross-site scripting (XSS) usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos prior to 0.9.0 has a feature to upload file and display it, and by uploading a crafted SVG file, an attacker could perform a stored cross-site scripting attack with the image direct link. This was patched in version 0.9.0. | fixed | osv:GHSA-c8jh-vcjh-fx2w |
| medium | any | \u2014 | usememos/memos Cross-Site Request Forgery vulnerability Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior. | open | osv:GHSA-c5hq-35h7-r9x4 |
| medium | any | 0.9.0 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | fixed | osv:GHSA-c2v4-8r9g-g5xj |
| medium | any | 0.10.4-0.20230211093429-b11d2130a084 | Cross Site Scripting in usememos/memos All versions of the package github.com/usememos/memos/server prior to 0.11.0 are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme. | fixed | osv:GHSA-9w8x-5hv5-r6gw |
| medium | any | 0.9.0 | usememos/memos vulnerable to improper access control Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. | fixed | osv:GHSA-9v48-2h5x-fvpm |
| medium | any | 0.10.0 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | fixed | osv:GHSA-9h7x-9pmh-7gg8 |
| medium | any | 0.22.0 | memos vulnerable to Server-Side Request Forgery and Cross-site Scripting memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the `/o/get/image` that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability. Version 0.22.0 of memos removes the vulnerable file. | fixed | osv:GHSA-9cqm-mgv9-vv9j |
| medium | any | 0.25.3 | memos vulnerability allows arbitrarily modification or deletion registered identity providers Incorrect access control in the Identity Provider service of usememos memos v0.25.2 allows attackers with low-level privileges to arbitrarily modify or delete registered identity providers, leading to an account takeover or Denial of Service (DoS). | fixed | osv:GHSA-99m2-qwx6-2w6f |
| medium | any | 0.9.0 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | fixed | osv:GHSA-97rc-mm5j-f6rj |
| medium | any | 0.25.3 | memos vulnerability allows arbitrarily modification or deletion of attachments Incorrect access control in usememos memos v0.25.2 allows attackers with low-level privileges to arbitrarily modify or delete attachments made by other users. | fixed | osv:GHSA-8p44-g572-557h |
| medium | any | 0.25.3 | memos vulnerability allows arbitrarily reactions deletion Incorrect access control in usememos memos v0.25.2 allows attackers with low-level privileges to arbitrarily delete reactions made to other users' Memos. | fixed | osv:GHSA-8jcj-g9f4-qx42 |
| medium | any | 0.10.0 | usememos/memos vulnerable to stored Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | fixed | osv:GHSA-8686-4cr3-76wj |
| medium | any | 0.9.1 | usememos/memos has Insufficient Granularity of Access Control An Insufficient Granularity of Access Control in usememos/memos prior to 0.9.0 can allow an attacker to delete a memo from the archives. | fixed | osv:GHSA-7qpw-2j9m-rw8c |
| medium | any | \u2014 | Memos Vulnerable to Path Traversal via the CreateResource Endpoint When Memos 0.22 is configured to store objects locally, an attacker can create a file via the CreateResource endpoint containing a path traversal sequence in the name, allowing arbitrary file write on the server. | open | osv:GHSA-78j5-8vq7-jxv5 |
| medium | any | 0.9.1 | usememos/memos vulnerable to Improper Handling of Insufficient Permissions or Privileges Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1. | fixed | osv:GHSA-6whj-8g9g-5jvx |
| medium | any | 0.9.1 | usememos/memos Improper Access Control vulnerability Improper Access Control in GitHub repository usememos/memos 0.9.0 and prior. | fixed | osv:GHSA-6fx9-29x2-fmfj |
| medium | any | 0.16.1 | memos vulnerable to Server-Side Request Forgery in /o/get/httpmeta memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/httpmeta that allows unauthenticated users to enumerate the internal network and receive limited html values in json form. This vulnerability is fixed in 0.16.1. | fixed | osv:GHSA-6fcf-g3mp-xj2x |
| medium | any | 0.22.0 | memos vulnerable to Server-Side Request Forgery in /api/resource memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the `/api/resource` that allows authenticated users to enumerate the internal network. Version 0.22.0 of memos removes the vulnerable file. | fixed | osv:GHSA-65fm-2jgr-j7qq |
| medium | any | 0.9.1 | usememos/memos Cross-Site Request Forgery vulnerability Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior. | fixed | osv:GHSA-642q-2q68-9j3p |
| medium | any | 0.10.0 | Stored XSS using two files in usememos/memos A stored cross-site scripting (XSS) vulnerability was discovered in usememos/memos version 0.9.1. This vulnerability allows an attacker to upload a JavaScript file containing a malicious script and reference it in an HTML file. When the HTML file is accessed, the malicious script is executed. This can lead to the theft of sensitive information, such as login credentials, from users visiting the affected website. The issue has been fixed in version 0.10.0. | fixed | osv:GHSA-5r2g-59px-3q9w |
| medium | any | 0.9.1 | sememos/memos vulnerable to Improper Handling of Values In usememos/memos 0.9.0 and prior, an attacker can post malicious content to another user's memos page via POST request. | fixed | osv:GHSA-42q2-m54f-jh95 |
| critical | any | 0.9.1 | usememos/memos vulnerable to Cross-site Scripting Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1. | fixed | osv:GHSA-x9p9-v3x6-68mq |
| critical | any | 0.13.2 | Account TakeOver Due to Improper Handling of JWT Tokens in usememos/memos Improper Access Control in GitHub repository usememos/memos prior to 0.13.2. As of commit `c9aa2eeb9` access tokens which fail validation are rejected. | fixed | osv:GHSA-j2gj-g3p9-7mrr |
| critical | any | 0.9.1 | usememos/memos Cross-site Scripting vulnerability Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1. | fixed | osv:GHSA-8w5q-5fpq-v4pm |
| critical | any | 0.9.0 | usememos/memos Authorization Bypass Through User-Controlled Key vulnerability Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.0. | fixed | osv:GHSA-68gw-r2x5-7r5r |
API access
Get this data programmatically \u2014 free, no authentication.
curl https://depscope.dev/api/bugs/go/github.com/usememos/memos