Description
A vulnerability was found in mem0ai mem0 up to 1.0.11. This affects the function pickle.load/pickle.dump of the file mem0/vector_stores/faiss.py. Performing a manipulation results in deserialization. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The patch is named 62dca096f9236010ca15fea9ba369ba740b86b7a. Applying a patch is the recommended action to fix this issue.
Scores
CVSS v3
6.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Details
CWE
CWE-20
CWE-502
Status
published
Products (12)
mem0ai/mem0
1.0.0
mem0ai/mem0
1.0.1
mem0ai/mem0
1.0.10
mem0ai/mem0
1.0.11
mem0ai/mem0
1.0.2
mem0ai/mem0
1.0.3
mem0ai/mem0
1.0.4
mem0ai/mem0
1.0.5
mem0ai/mem0
1.0.6
mem0ai/mem0
1.0.7
... and 2 more
Published
May 01, 2026
Tracked Since
May 02, 2026