-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from missing authorization checks in CRUD operations where: 1) User-controlled IDs were accepted without verifying resource ownership 2) CreatorID fields in structs were user-controllable via JSON (evidenced by adding json:"-" in API structs) 3) The patch added explicit creatorID comparisons after fetching resources. The vulnerable functions handled core operations (update/delete) that accepted user-provided identifiers but lacked proper access control checks before acting on those resources.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/usememos/memos | go | <= 0.9.0 | 0.9.1 |
Ongoing coverage of React2Shell