Description
A vulnerability was found in mem0ai mem0 up to 1.0.11. This affects the function pickle.load/pickle.dump of the file mem0/vector_stores/faiss.py. Performing a manipulation results in deserialization. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The patch is named 62dca096f9236010ca15fea9ba369ba740b86b7a. Applying a patch is the recommended action to fix this issue.
Problem types
Product status
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9
1.0.10
1.0.11
Timeline
| 2026-05-01: | Advisory disclosed |
| 2026-05-01: | VulDB entry created |
| 2026-05-01: | VulDB entry last update |
Credits
edoardottt (VulDB User)
References
vuldb.com/vuln/360550 (VDB-360550 | mem0ai mem0 faiss.py pickle.dump deserialization)
vuldb.com/vuln/360550/cti (VDB-360550 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/805562 (Submit #805562 | Mem0 <= v1.0.11 Unsafe Deserialization)
github.com/mem0ai/mem0/issues/3778
github.com/mem0ai/mem0/pull/4833
github.com/...ommit/62dca096f9236010ca15fea9ba369ba740b86b7a
github.com/mem0ai/mem0/