{"id":"CVE-2025-22952","details":"elestio memos v0.23.0 is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied URLs, which can be exploited to perform SSRF attacks.","aliases":["GHSA-wfxg-v3j4-7qmj","GO-2025-3492"],"modified":"2026-03-13T07:58:38.280010Z","published":"2025-02-27T20:16:04.983Z","related":["openSUSE-SU-2025:14889-1"],"references":[{"type":"WEB","url":"https://elest.io/open-source/memos"},{"type":"REPORT","url":"https://github.com/usememos/memos/issues/4413"},{"type":"FIX","url":"https://github.com/usememos/memos/pull/4428"},{"type":"PACKAGE","url":"https://github.com/usememos/memos"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/usememos/memos","events":[{"introduced":"0"},{"last_affected":"ea394d89b27ec087dc005b17bba37ec1cb0e98cc"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.23.0-NA"}]}}],"versions":["v0.1.2","v0.10.2","v0.10.3","v0.11.0","v0.11.1","v0.11.2","v0.12.0","v0.12.1","v0.12.2","v0.13.0","v0.13.1","v0.13.2","v0.14.0","v0.14.1","v0.14.2","v0.14.3","v0.14.4","v0.15.0","v0.15.1","v0.15.2","v0.16.0","v0.16.1","v0.17.1","v0.18.0","v0.18.1","v0.18.2","v0.19.0","v0.19.1","v0.20.0","v0.20.1","v0.21.0","v0.22.0","v0.22.1","v0.22.2","v0.22.3","v0.22.4","v0.22.5","v0.23.0","v0.23.0-rc.0","v0.23.0-rc.1","v0.23.0-rc.2","v0.23.0-rc.3","v0.4.0","v0.4.1","v0.4.2","v0.4.3","v0.5.0","v0.6.0","v0.6.1","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.8.0","v0.8.1","v0.8.2","v0.8.3","v0.9.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22952.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}