Отправить #793432: Usememos Memos 0.22.1 Cross Site ScriptingИнформация

НазваниеUsememos Memos 0.22.1 Cross Site Scripting
ОписаниеA critical vulnerability has been discovered in usememos/memos (versions up to and including 0.22.1). This security flaw involves a combination of Broken Access Control (CWE-284) and Stored Cross-Site Scripting (CWE-79). The backend gRPC-web endpoint 'UpdateInstanceSetting' fails to properly validate user permissions, allowing a standard 'Member' user to bypass the frontend UI restrictions and modify global instance settings. Specifically, an attacker can navigate to the system settings page and inject malicious JavaScript or CSS into the 'additionalStyle' or 'additionalScript' fields. Because the frontend application (src/App.tsx) injects these settings directly into the DOM using the 'innerHTML' property without sanitization, the malicious code is executed in the context of every user visiting the site (including administrators). This allows for full session hijacking, credential theft (memos_access_token), and unauthorized administrative actions. 2. Short Summary (Submission Title/Summary Field) Critical vulnerability chain in usememos/memos allows unprivileged users to perform Stored XSS and hijack global instance settings due to broken access control on the UpdateInstanceSetting gRPC-web endpoint. 3. Quick Reference for VulDB Fields Class: Web Application Type: Stored XSS / Broken Access Control CWE: CWE-79 / CWE-284 Impact: Critical (Full System/Session Compromise) CVSS v3.1/4.0: ~9.0
Источник⚠️ https://github.com/Dave-gilmore-aus/security-advisories/blob/main/usememos-security-advisory
Пользователь
 davidgilmore (UID 96940)
Представление31.03.2026 07:22 (22 дни назад)
Модерация19.04.2026 21:17 (20 days later)
Статуспринято
Запись VulDB358268 [usememos до 0.22.1 UpdateInstanceSetting src/App.tsx memos_access_token additionalStyle/additionalScript эскалация привилегий]
Баллы20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!