CVE-2025-56761
BaseFortify
Publication date: 2025-09-03
Last updated on: 2025-09-09
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| usememos | memos | 0.22.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-56761 is a Stored Cross-Site Scripting (XSS) vulnerability in Memos 0.22 that occurs through the upload attachment and user avatar features. The application does not verify the content type of uploaded data and serves it back as is. An authenticated attacker can inject malicious scripts that get stored and executed when viewed by an admin, allowing the attacker to escalate their privileges. [1]
How can this vulnerability impact me? :
This vulnerability can allow an authenticated attacker to execute malicious JavaScript in the context of an administrator's browser, leading to privilege escalation. This can enable the attacker to change application settings, such as switching storage to local, which can then be exploited further to perform arbitrary file writes and potentially take over the server. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying attempts to upload malicious files via the upload attachment or user avatar features in Memos 0.22, especially files containing embedded scripts or unusual content types. Since the vulnerability allows stored XSS and arbitrary file writes when local storage is enabled, monitoring HTTP requests to the file upload endpoints for suspicious payloads or filenames with path traversal sequences (e.g., '../') is key. Commands to detect such activity could include using web server logs or network traffic inspection tools like tcpdump or Wireshark to filter POST requests to the upload endpoints. For example, using grep on server logs to find suspicious filenames: grep -r "../" /path/to/memos/logs or monitoring for JavaScript payloads in uploads. Additionally, scanning the storage directory for unexpected files or scripts can help detect exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the Memos application to trusted users only to prevent unauthorized or malicious uploads. Disabling or limiting the upload attachment and user avatar features can reduce attack surface. Monitoring and filtering uploaded content types to ensure only safe file types are accepted is recommended. Since no official patch is available yet, users should consider migrating to a more secure platform or applying custom patches if possible. Awaiting official fixes from maintainers and applying them promptly once available is also advised. [1]