Vulnerability Description
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
CVSS Score
6.5
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Usememos | Memos | < 0.9.1 |
Related Weaknesses (CWE)
References
- https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a5PatchThird Party Advisory
- https://huntr.dev/bounties/33924891-5c36-4b46-b417-98eaab688c4cExploitPatchThird Party Advisory
- https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a5PatchThird Party Advisory
- https://huntr.dev/bounties/33924891-5c36-4b46-b417-98eaab688c4cExploitPatchThird Party Advisory
FAQ
What is CVE-2022-4812?
CVE-2022-4812 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
How severe is CVE-2022-4812?
CVE-2022-4812 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-4812?
Check the references section above for vendor advisories and patch information. Affected products include: Usememos Memos.