VYPR
Moderate severityNVD Advisory· Published Sep 3, 2025· Updated Sep 4, 2025

CVE-2025-56760

CVE-2025-56760

Description

When Memos 0.22 is configured to store objects locally, an attacker can create a file via the CreateResource endpoint containing a path traversal sequence in the name, allowing arbitrary file write on the server.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Memos 0.22 allows authenticated users to write arbitrary files on the server via path traversal in the CreateResource endpoint.

Vulnerability

Overview

CVE-2025-56760 affects Memos version 0.22 when configured to store objects locally. The vulnerability resides in the CreateResource endpoint, which fails to sanitize user-supplied filenames. An attacker can include path traversal sequences (e.g., ../) in the resource name, enabling arbitrary file write outside the intended upload directory [1][2].

Exploitation

To exploit this vulnerability, an attacker must be an authenticated user of the Memos instance. No additional privileges are required beyond standard user authentication. By crafting a malicious filename containing path traversal sequences, the attacker can write files to arbitrary locations on the server filesystem [1][2]. The endpoint does not perform authorization checks on the upload path, allowing any authenticated user to write files outside the designated storage directory [1].

Impact

Successful exploitation allows an attacker to write arbitrary files on the server. This can lead to remote code execution, data corruption, or complete server compromise. The vulnerability is particularly severe because it can be chained with other issues, such as stored XSS, to escalate privileges and achieve full platform takeover [1].

Mitigation

As of the publication date, the Memos maintainers have not responded to responsible disclosure, and no official patch has been released. Organizations running Memos 0.22 are advised to restrict access to trusted users only and monitor for updates from the project [1]. The vulnerability was disclosed under a 90-day disclosure policy [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/usememos/memosGo
<= 0.22.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.