GHSA-qgjp-5g5x-vhq2

Suggest an improvement
Source
https://github.com/advisories/GHSA-qgjp-5g5x-vhq2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-qgjp-5g5x-vhq2/GHSA-qgjp-5g5x-vhq2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qgjp-5g5x-vhq2
Aliases
Published
2025-12-08T18:30:44Z
Modified
2025-12-17T01:20:16.403528Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
memos lacks file name validation or verification
Details

A lack of file name validation or verification in the Attachment service of usememos memos v0.25.2 allows attackers to execute a path traversal.

Database specific
{
    "github_reviewed_at": "2025-12-09T14:25:42Z",
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-73"
    ],
    "github_reviewed": true,
    "nvd_published_at": "2025-12-08T17:16:21Z"
}
References

Affected packages

Go / github.com/usememos/memos

Package

Name
github.com/usememos/memos
View open source insights on deps.dev
Purl
pkg:golang/github.com/usememos/memos

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.25.3

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-qgjp-5g5x-vhq2/GHSA-qgjp-5g5x-vhq2.json"