Skip to content

x/vulndb: potential Go vuln in github.com/usememos/memos: GHSA-mr34-8733-grr2 #4127

@GoVulnBot

Description

@GoVulnBot

Advisory GHSA-mr34-8733-grr2 references a vulnerability in the following Go modules:

Module
github.com/usememos/memos

Description:

Summary

Access Tokens are used to authenticate application access. When a user changes their password, the existing list of Access Tokens stay valid instead of expiring. If a user finds that their account has been compromised, they can update their password.

The bad actor though will still have access to their account because the bad actor's Access Token stays on the list as a valid token. The user will have to manually delete the bad actor's Access Token to secure their account. The list of Access Tokens has a generic Description which makes it hard to pinpoint a bad actor in a list of ...

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/usememos/memos
      vulnerable_at: 0.25.2
summary: Memos' Access Tokens Stay Valid after User Password Change in github.com/usememos/memos
cves:
    - CVE-2024-21635
ghsas:
    - GHSA-mr34-8733-grr2
references:
    - advisory: https://github.com/advisories/GHSA-mr34-8733-grr2
    - advisory: https://github.com/usememos/memos/security/advisories/GHSA-mr34-8733-grr2
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21635
    - web: http://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures
    - web: https://owasp.org/Top10/A04_2021-Insecure_Design
source:
    id: GHSA-mr34-8733-grr2
    created: 2025-11-14T23:02:35.801573896Z
review_status: UNREVIEWED

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions