Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xqxw-r767-67m7 | mem0ai mem0 has an Improper Input Validation Issue |
Mon, 04 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mem0ai
Mem0ai mem0 |
|
| Vendors & Products |
Mem0ai
Mem0ai mem0 |
|
| Metrics |
ssvc
|
Fri, 01 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in mem0ai mem0 up to 1.0.11. This affects the function pickle.load/pickle.dump of the file mem0/vector_stores/faiss.py. Performing a manipulation results in deserialization. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The patch is named 62dca096f9236010ca15fea9ba369ba740b86b7a. Applying a patch is the recommended action to fix this issue. | |
| Title | mem0ai mem0 faiss.py pickle.dump deserialization | |
| Weaknesses | CWE-20 CWE-502 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-05T19:45:33.404Z
Reserved: 2026-05-01T09:52:26.382Z
Link: CVE-2026-7597
Updated: 2026-05-04T15:02:59.288Z
Status : Deferred
Published: 2026-05-01T22:16:16.713
Modified: 2026-05-05T20:16:39.950
Link: CVE-2026-7597
No data.
OpenCVE Enrichment
Updated: 2026-05-04T16:07:15Z
Github GHSA