Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56760: n/a

0
Medium
VulnerabilityCVE-2025-56760cvecve-2025-56760
Published: Wed Sep 03 2025 (09/03/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

When Memos 0.22 is configured to store objects locally, an attacker can create a file via the CreateResource endpoint containing a path traversal sequence in the name, allowing arbitrary file write on the server.

AI-Powered Analysis

AILast updated: 09/10/2025, 20:29:14 UTC

Technical Analysis

CVE-2025-56760 is a medium-severity vulnerability affecting the Memos 0.22 application when it is configured to store objects locally. The vulnerability arises from insufficient validation of file names passed to the CreateResource endpoint. Specifically, an attacker can supply a filename containing path traversal sequences (e.g., '../') which allows them to write arbitrary files to locations outside the intended storage directory on the server. This arbitrary file write capability can lead to unauthorized modification of server files, potentially enabling privilege escalation, data tampering, or disruption of application functionality. The vulnerability is classified under CWE-24 (Improper Restriction of File Name in a Pathname), indicating a failure to properly sanitize user-supplied file paths. The CVSS v3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), but does require privileges (PR:L) though no user interaction (UI:N). The impact affects integrity (I:L) but not confidentiality or availability. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability was reserved in August 2025 and published in September 2025, indicating recent discovery. The lack of affected version details suggests the vulnerability may apply broadly to Memos 0.22 installations configured with local object storage. Overall, this vulnerability allows an authenticated attacker with low privileges to write arbitrary files on the server, which can be leveraged for further attacks depending on the server environment and file write locations.

Potential Impact

For European organizations using Memos 0.22 with local object storage, this vulnerability poses a risk of unauthorized file writes on critical servers. Although the CVSS score is medium and confidentiality and availability are not directly impacted, the integrity compromise can lead to serious consequences. Attackers could modify application files, inject malicious scripts, or alter configuration files, potentially enabling privilege escalation or persistent backdoors. This could disrupt business operations, lead to data corruption, or facilitate lateral movement within the network. Organizations in sectors with strict data integrity requirements, such as finance, healthcare, and government, may face compliance risks if exploited. Additionally, the need for low privileges means that insider threats or compromised low-level accounts could exploit this vulnerability. The absence of known exploits provides a window for proactive mitigation, but the vulnerability should be treated seriously given the potential for escalation and persistence.

Mitigation Recommendations

1. Apply patches or updates from the Memos development team as soon as they become available to address this vulnerability. 2. Until patches are released, restrict access to the CreateResource endpoint to trusted users only and monitor usage logs for suspicious file creation attempts, especially those containing path traversal sequences. 3. Implement web application firewall (WAF) rules to detect and block requests with path traversal patterns targeting the CreateResource endpoint. 4. Harden server file system permissions to limit the locations where the application can write files, preventing writes outside designated directories. 5. Conduct code reviews and static analysis on the application to identify and remediate improper input validation related to file paths. 6. Employ intrusion detection systems (IDS) to alert on anomalous file creation or modification activities. 7. Educate administrators and developers about the risks of path traversal vulnerabilities and secure coding practices to prevent similar issues in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b87504ad5a09ad00f87cb2

Added to database: 9/3/2025, 5:04:04 PM

Last enriched: 9/10/2025, 8:29:14 PM

Last updated: 10/16/2025, 6:45:07 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats