CVE-2022-4805: usememos/memos Incorrect Use of Privileged APIs vulnerability
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.15132%
CWE
Published
12/28/2022
Updated
2/3/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/usememos/memos | go | <= 0.9.0 | 0.9.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing ownership checks in API endpoints handling privileged operations. The commit added critical CreatorID validation steps that were previously absent. Key indicators are: 1) Removal of CreatorID from query filters and replacement with post-fetch ownership checks 2) Structural changes to API request bindings (json:"-" annotations) preventing client manipulation 3) Added authorization blocks checking memo.CreatorID == userID before operations. The affected functions handled memo/shortcut/resource modification/deletion endpoints that previously relied on flawed query-based 'implicit' authorization rather than explicit post-fetch ownership verification.