CVE-2025-65799

A lack of file name validation or verification in the Attachment service of usememos memos v0.25.2 allows attackers to execute a path traversal.
References
Link Resource
http://memos.com Permissions Required
http://usememos.com Product
https://github.com/usememos/memos/pull/5218 Issue Tracking Patch
https://herolab.usd.de/security-advisories/usd-2025-0056/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:usememos:memos:0.25.2:*:*:*:*:*:*:*

History

09 Dec 2025, 17:15

Type Values Removed Values Added
First Time Usememos
Usememos memos
CPE cpe:2.3:a:usememos:memos:0.25.2:*:*:*:*:*:*:*
References () http://memos.com - () http://memos.com - Permissions Required
References () http://usememos.com - () http://usememos.com - Product
References () https://github.com/usememos/memos/pull/5218 - () https://github.com/usememos/memos/pull/5218 - Issue Tracking, Patch
References () https://herolab.usd.de/security-advisories/usd-2025-0056/ - () https://herolab.usd.de/security-advisories/usd-2025-0056/ - Exploit, Third Party Advisory

08 Dec 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CWE CWE-73

08 Dec 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-08 17:16

Updated : 2025-12-09 17:15


NVD link : CVE-2025-65799

Mitre link : CVE-2025-65799

CVE.ORG link : CVE-2025-65799


JSON object : View

Products Affected

usememos

  • memos
CWE
CWE-73

External Control of File Name or Path