CVE-2022-4803: usememos/memos Improper Access Control vulnerability
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.20711%
CWE
Published
12/28/2022
Updated
2/3/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/usememos/memos | go | <= 0.9.0 | 0.9.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing authorization checks in CRUD operations where: 1) User-controlled IDs were accepted without verifying resource ownership 2) CreatorID fields in structs were user-controllable via JSON (evidenced by adding json:"-" in API structs) 3) The patch added explicit creatorID comparisons after fetching resources. The vulnerable functions handled core operations (update/delete) that accepted user-provided identifiers but lacked proper access control checks before acting on those resources.