CVE-2025-65796

MEDIUM4.3/ 10.0
Share:
Published: December 8, 2025 at 04:15 PM
Modified: December 9, 2025 at 05:45 PM
Source: cve@mitre.org

Vulnerability Description

Incorrect access control in usememos memos v0.25.2 allows attackers with low-level privileges to arbitrarily delete reactions made to other users' Memos.

CVSS Metrics

Base Score
4.3
Severity
MEDIUM
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Weaknesses (CWE)

Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0

AI Security Analysis

01 // Technical Summary

Attackers with low-level privileges can arbitrarily delete reactions on other users' memos in usememos memos v0.25.2 due to an incorrect access control implementation. This allows for denial-of-service and potential data manipulation, impacting the integrity of user interactions and potentially leading to user dissatisfaction or data loss.

02 // Vulnerability Mechanism

Step 1: Authentication: An attacker obtains valid, low-level credentials to access the usememos memos application.

Step 2: Reaction Identification: The attacker identifies the target reaction(s) to be deleted. This likely involves obtaining the reaction ID or other identifying information.

Step 3: Crafting the Deletion Request: The attacker crafts a deletion request, typically an HTTP request, targeting the specific reaction(s) identified in Step 2. This request will likely include the reaction ID.

Step 4: Bypassing Access Control: The attacker's crafted request bypasses the flawed access control checks. The application fails to verify that the attacker is the owner of the reaction or has sufficient privileges to delete it.

Step 5: Reaction Deletion: The application processes the deletion request, successfully deleting the targeted reaction(s).

Step 6: Impact: The targeted reactions are removed, potentially disrupting user interactions and causing a denial of service for the affected users.

03 // Deep Technical Analysis

The vulnerability stems from a flaw in the access control logic within usememos memos v0.25.2. Specifically, the application fails to properly validate the authorization of a user attempting to delete a reaction. The code likely checks if the user is the owner of the reaction, but it does not adequately enforce this check. The root cause is a missing or flawed check on the user's permissions before allowing the deletion of a reaction. This could be due to a simple logic error, such as a missing if statement or an incorrect comparison. The lack of proper authorization allows any authenticated user to delete any reaction, regardless of ownership. This is a classic example of an access control bypass vulnerability.

CVE-2025-65796 - MEDIUM Severity (4.3) | Free CVE Database | 4nuxd