Metrics
Affected Vendors & Products
Thu, 14 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mem0
Mem0 mem0 |
|
| CPEs | cpe:2.3:a:mem0:mem0:1.0.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Mem0
Mem0 mem0 |
Wed, 13 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthorized Memory Creation Without Authentication in mem0 1.0.0 |
Wed, 13 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Missing Authentication on mem0 Memory Creation Endpoint Allows Unauthorized Data Injection | |
| Weaknesses | CWE-284 |
Wed, 13 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-306 CWE-862 |
|
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mem0ai
Mem0ai mem0 |
|
| Vendors & Products |
Mem0ai
Mem0ai mem0 |
Tue, 12 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Missing Authentication on mem0 Memory Creation Endpoint Allows Unauthorized Data Injection | |
| Weaknesses | CWE-284 |
Tue, 12 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The mem0 1.0.0 server lacks authentication and authorization controls for its memory creation API endpoint (POST /memories). The endpoint allows unauthenticated users to submit arbitrary memory records without verifying their identity or permissions. A remote attacker can exploit this by sending unauthenticated POST requests to create malicious or spoofed memory entries in the database, leading to unauthorized data injection and potential data pollution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-13T13:13:26.506Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31245
Updated: 2026-05-13T13:13:21.345Z
Status : Analyzed
Published: 2026-05-12T18:16:53.010
Modified: 2026-05-14T18:39:12.690
Link: CVE-2026-31245
No data.