Home

Description

A vulnerability was found in mem0ai mem0 up to 1.0.11. This affects the function pickle.load/pickle.dump of the file mem0/vector_stores/faiss.py. Performing a manipulation results in deserialization. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The patch is named 62dca096f9236010ca15fea9ba369ba740b86b7a. Applying a patch is the recommended action to fix this issue.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-01 | Updated 2026-05-01 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

Deserialization

Improper Input Validation

Product status

1.0.0
affected

1.0.1
affected

1.0.2
affected

1.0.3
affected

1.0.4
affected

1.0.5
affected

1.0.6
affected

1.0.7
affected

1.0.8
affected

1.0.9
affected

1.0.10
affected

1.0.11
affected

Timeline

2026-05-01:Advisory disclosed
2026-05-01:VulDB entry created
2026-05-01:VulDB entry last update

Credits

edoardottt (VulDB User) reporter

References

vuldb.com/vuln/360550 (VDB-360550 | mem0ai mem0 faiss.py pickle.dump deserialization) vdb-entry technical-description

vuldb.com/vuln/360550/cti (VDB-360550 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/submit/805562 (Submit #805562 | Mem0 <= v1.0.11 Unsafe Deserialization) third-party-advisory

github.com/mem0ai/mem0/issues/3778 exploit issue-tracking

github.com/mem0ai/mem0/pull/4833 issue-tracking patch

github.com/...ommit/62dca096f9236010ca15fea9ba369ba740b86b7a patch

github.com/mem0ai/mem0/ product

cve.org (CVE-2026-7597)

nvd.nist.gov (CVE-2026-7597)

Download JSON