Description
A weakness has been identified in usememos memos up to 0.22.1. This affects the function memos_access_token of the file src/App.tsx of the component UpdateInstanceSetting. This manipulation of the argument additionalStyle/additionalScript causes improper authorization. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Authorization leading to potential remote misuse of memos functionality
Action: Apply Patch
AI Analysis

Impact

A weakness in usememos memos through version 0.22.1 allows an attacker to influence the memos_access_token function by supplying specially crafted values for additionalStyle and additionalScript, thereby bypassing the normal authorization checks. This flaw is categorized as Broken Authentication (CWE‑266) and Improper Authorization (CWE‑285). If exploited, unauthorized users could gain access to protected memos, read or modify content that should be restricted, or perform other privileged actions within the application.

Affected Systems

The vulnerability impacts the usememos memos application up to and including release 0.22.1. All installations of these versions are susceptible if the vulnerable UpdateInstanceSetting component is accessible.

Risk and Exploitability

The CVSS score of 5.3 indicates medium severity. The vulnerability can be exploited remotely and an exploit has been publicly released, suggesting that it may be actively used. The EPSS score is not available, and the issue is not listed in CISA’s KEV catalog, so the current likelihood of exploitation is uncertain. Nevertheless, because the attack vector is remote and the exploit is available, administrators should treat the risk as moderate with potential for significant impact if the flaw is not remediated.

Generated by OpenCVE AI on April 20, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Ensure usememos/memos is upgraded to the latest release that addresses the improper authorization in UpdateInstanceSetting (versions higher than 0.22.1 are recommended).
  • If an update cannot be applied immediately, isolate the UpdateInstanceSetting endpoint with network‑level controls, such as firewall rules or an API gateway that limits access to trusted IP ranges or requires additional authentication.
  • Validate or sanitize the additionalStyle and additionalScript input parameters to enforce proper authentication logic, or disable these features through configuration if the application permits.

Generated by OpenCVE AI on April 20, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 12:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in usememos memos up to 0.22.1. This affects the function memos_access_token of the file src/App.tsx of the component UpdateInstanceSetting. This manipulation of the argument additionalStyle/additionalScript causes improper authorization. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title usememos UpdateInstanceSetting App.tsx memos_access_token improper authorization
First Time appeared Usememos
Usememos memos
Weaknesses CWE-266
CWE-285
CPEs cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*
Vendors & Products Usememos
Usememos memos
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T15:02:48.499Z

Reserved: 2026-04-19T19:17:20.429Z

Link: CVE-2026-6634

cve-icon Vulnrichment

Updated: 2026-04-20T15:02:29.424Z

cve-icon NVD

Status : Received

Published: 2026-04-20T12:16:09.490

Modified: 2026-04-20T12:16:09.490

Link: CVE-2026-6634

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T13:30:05Z

Weaknesses