CVE-2026-7597

MEDIUM

mem0ai mem0 faiss.py pickle.dump deserialization

Title source: cna
STIX 2.1

Description

A vulnerability was found in mem0ai mem0 up to 1.0.11. This affects the function pickle.load/pickle.dump of the file mem0/vector_stores/faiss.py. Performing a manipulation results in deserialization. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The patch is named 62dca096f9236010ca15fea9ba369ba740b86b7a. Applying a patch is the recommended action to fix this issue.

Scores

CVSS v3 6.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C

Details

CWE
CWE-20 CWE-502
Status published
Products (12)
mem0ai/mem0 1.0.0
mem0ai/mem0 1.0.1
mem0ai/mem0 1.0.10
mem0ai/mem0 1.0.11
mem0ai/mem0 1.0.2
mem0ai/mem0 1.0.3
mem0ai/mem0 1.0.4
mem0ai/mem0 1.0.5
mem0ai/mem0 1.0.6
mem0ai/mem0 1.0.7
... and 2 more
Published May 01, 2026
Tracked Since May 02, 2026