Impact
This vulnerability exists in mem0ai mem0 up to version 1.0.11 in the faiss.py module where pickle.load and pickle.dump are used without input validation. An attacker can supply a crafted payload that triggers Python’s pickle deserialization, creating an unsafe deserialization flaw (CWE-20 and CWE-502). The vulnerability could allow execution of arbitrary code if the deserialized payload contains malicious objects, but the CVE description does not confirm that code execution has been demonstrated.
Affected Systems
The affected product is mem0ai mem0, specifically the faiss vector_store implementation bundled with versions up through 1.0.11. Users running these releases, especially those that expose the faiss module to untrusted input over the network, are at risk.
Risk and Exploitability
The CVSS score of 5.3 indicates a medium severity. No EPSS score is publicly available, and the vulnerability is not listed in the CISA KEV catalog. The description confirms that the attack can be started remotely and that the exploit is publicly available, suggesting a non‑trivial risk to systems that accept external input. The presence of an available patch limits the window for exploitation and mitigates the risk if applied promptly.
OpenCVE Enrichment