Vulnerability Description
All versions of the package github.com/usememos/memos/server are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Usememos | Memos | All versions |
Related Weaknesses (CWE)
References
- https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81aePatch
- https://github.com/usememos/memos/issues/1026Exploit
- https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070ExploitIssue TrackingPatch
- https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81aePatch
- https://github.com/usememos/memos/issues/1026Exploit
- https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070ExploitIssue TrackingPatch
FAQ
What is CVE-2022-25978?
CVE-2022-25978 is a vulnerability with a CVSS score of 5.4 (MEDIUM). All versions of the package github.com/usememos/memos/server are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce l...
How severe is CVE-2022-25978?
CVE-2022-25978 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-25978?
Check the references section above for vendor advisories and patch information. Affected products include: Usememos Memos.