First published: Fri Nov 15 2024(Updated: )
A stored cross-site scripting (XSS) vulnerability was discovered in usememos/memos version 0.9.1. This vulnerability allows an attacker to upload a JavaScript file containing a malicious script and reference it in an HTML file. When the HTML file is accessed, the malicious script is executed. This can lead to the theft of sensitive information, such as login credentials, from users visiting the affected website. The issue has been fixed in version 0.10.0.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/usememos/memos | <0.10.0 | 0.10.0 |
Usememos Memos | =0.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0109 has been rated with a moderate severity due to its stored cross-site scripting (XSS) nature.
To mitigate CVE-2023-0109, upgrade the usememos/memos software to version 0.10.0 or later.
CVE-2023-0109 enables attackers to execute malicious JavaScript in the context of user sessions through stored XSS.
CVE-2023-0109 specifically affects usememos/memos version 0.9.1.
Yes, CVE-2023-0109 puts user data at risk by potentially allowing attackers to steal cookies and session tokens via XSS.