CVE-2025-56760
Description
When Memos 0.22 is configured to store objects locally, an attacker can create a file via the CreateResource endpoint containing a path traversal sequence in the name, allowing arbitrary file write on the server.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Memos 0.22 allows authenticated users to write arbitrary files on the server via path traversal in the CreateResource endpoint.
Vulnerability
Overview
CVE-2025-56760 affects Memos version 0.22 when configured to store objects locally. The vulnerability resides in the CreateResource endpoint, which fails to sanitize user-supplied filenames. An attacker can include path traversal sequences (e.g., ../) in the resource name, enabling arbitrary file write outside the intended upload directory [1][2].
Exploitation
To exploit this vulnerability, an attacker must be an authenticated user of the Memos instance. No additional privileges are required beyond standard user authentication. By crafting a malicious filename containing path traversal sequences, the attacker can write files to arbitrary locations on the server filesystem [1][2]. The endpoint does not perform authorization checks on the upload path, allowing any authenticated user to write files outside the designated storage directory [1].
Impact
Successful exploitation allows an attacker to write arbitrary files on the server. This can lead to remote code execution, data corruption, or complete server compromise. The vulnerability is particularly severe because it can be chained with other issues, such as stored XSS, to escalate privileges and achieve full platform takeover [1].
Mitigation
As of the publication date, the Memos maintainers have not responded to responsible disclosure, and no official patch has been released. Organizations running Memos 0.22 are advised to restrict access to trusted users only and monitor for updates from the project [1]. The vulnerability was disclosed under a 90-day disclosure policy [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/usememos/memosGo | <= 0.22.0 | — |
Affected products
2- Memos/Memosdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-78j5-8vq7-jxv5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-56760ghsaADVISORY
- github.com/usememos/memos/blob/v0.24.4/server/router/api/v1/resource_service.goghsaWEB
- www.sonarsource.com/blog/securing-go-applications-with-sonarqube-real-world-examplesghsaWEB
- www.sonarsource.com/blog/securing-go-applications-with-sonarqube-real-world-examples/mitre
News mentions
0No linked articles in our index yet.