Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21635: CWE-287: Improper Authentication in usememos memos

0
High
VulnerabilityCVE-2024-21635cvecve-2024-21635cwe-287
Published: Fri Nov 14 2025 (11/14/2025, 14:11:38 UTC)
Source: CVE Database V5
Vendor/Project: usememos
Product: memos

Description

Memos is a privacy-first, lightweight note-taking service that uses Access Tokens to authenticate application access. When a user changes their password, the existing list of Access Tokens stay valid instead of expiring. If a user finds that their account has been compromised, they can update their password. In versions up to and including 0.18.1, though, the bad actor will still have access to their account because the bad actor's Access Token stays on the list as a valid token. The user will have to manually delete the bad actor's Access Token to secure their account. The list of Access Tokens has a generic Description which makes it hard to pinpoint a bad actor in a list of Access Tokens. A known patched version of Memos isn't available. To improve Memos security, all Access Tokens will need to be revoked when a user changes their password. This removes the session for all the user's devices and prompts the user to log in again. One can treat the old Access Tokens as "invalid" because those Access Tokens were created with the older password.

AI-Powered Analysis

AILast updated: 11/14/2025, 14:35:16 UTC

Technical Analysis

CVE-2024-21635 is an improper authentication vulnerability classified under CWE-287 affecting the usememos memos application, a privacy-focused, lightweight note-taking service. The core issue lies in the handling of Access Tokens used for authenticating application access. In versions up to and including 0.18.1, when a user changes their password to secure their account after a suspected compromise, the existing Access Tokens are not invalidated or revoked. This means that any attacker who previously obtained an Access Token can continue to access the victim's account despite the password change. The tokens themselves have generic descriptions, which complicates the identification and manual revocation of malicious tokens by legitimate users. The vulnerability requires no user interaction and can be exploited remotely without elevated privileges, as the attacker only needs a valid Access Token obtained prior to the password change. There is no known exploit in the wild yet, and no patched version has been released at the time of this report. The recommended security improvement is to revoke all Access Tokens upon password change, forcing re-authentication on all devices and sessions. This would invalidate tokens created under the old password, closing the window of unauthorized access. The CVSS 4.0 score of 7.1 reflects the high impact on confidentiality and integrity due to persistent unauthorized access, combined with ease of exploitation and no required user interaction.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive information stored within the memos application. Unauthorized persistent access could lead to data leakage, intellectual property theft, or manipulation of notes that may be used for operational or strategic purposes. Since memos is marketed as a privacy-first note-taking tool, organizations relying on it for secure internal communication or documentation may face reputational damage if breaches occur. The inability to automatically revoke tokens after password changes undermines standard incident response procedures, potentially prolonging attacker presence. This is particularly critical for sectors such as finance, healthcare, and government agencies in Europe, where data privacy regulations like GDPR impose strict requirements on data protection and breach notification. Additionally, the generic token descriptions complicate forensic investigations and timely remediation. The lack of a patch means organizations must rely on manual token management and enhanced monitoring, increasing operational overhead and risk of oversight.

Mitigation Recommendations

Until an official patch is released, European organizations using memos should implement the following mitigations: 1) Educate users to manually review and revoke all Access Tokens associated with their accounts after any password change, despite the inconvenience. 2) Implement enhanced logging and monitoring of Access Token usage to detect anomalous or suspicious activity, such as tokens used from unusual IP addresses or devices. 3) Restrict memos access to trusted networks or VPNs to reduce exposure to unauthorized token use. 4) Encourage or enforce multi-factor authentication (MFA) at the application or infrastructure level to add an additional layer of security beyond Access Tokens. 5) Regularly audit and rotate Access Tokens proactively, even without password changes, to limit token lifespan. 6) Engage with the usememos vendor or community to track patch availability and apply updates promptly once released. 7) Consider alternative note-taking solutions with stronger session management if memos is critical and no timely fix is forthcoming. These steps go beyond generic advice by focusing on compensating controls tailored to the token management weakness and operational realities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2023-12-29T03:00:44.956Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69173aa53d7715a824c558f3

Added to database: 11/14/2025, 2:20:21 PM

Last enriched: 11/14/2025, 2:35:16 PM

Last updated: 11/15/2025, 1:38:39 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats