Vulnerability Description
The Memos application, up to version v0.24.3, allows for the embedding of markdown images with arbitrary URLs. When a user views a memo containing such an image, their browser automatically fetches the image URL without explicit user consent or interaction beyond viewing the memo. This can be exploited by an attacker to disclose the viewing user's IP address, browser User-Agent string, and potentially other request-specific information to the attacker-controlled server, leading to information disclosure and user tracking.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Usememos | Memos | <= 0.24.3 |
Related Weaknesses (CWE)
References
- https://github.com/fai1424/Vulnerability-Research/tree/main/CVE-2025-50738
- https://github.com/usememos/memosProduct
- https://github.com/usememos/memos/issues/4707#issuecomment-2898504237ExploitIssue Tracking
FAQ
What is CVE-2025-50738?
CVE-2025-50738 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Memos application, up to version v0.24.3, allows for the embedding of markdown images with arbitrary URLs. When a user views a memo containing such an image, their browser automatically fetches th...
How severe is CVE-2025-50738?
CVE-2025-50738 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-50738?
Check the references section above for vendor advisories and patch information. Affected products include: Usememos Memos.