
Cloud Vulnerability DB
A community-led vulnerabilities database
Elestio memos v0.23.0 contains a Server-Side Request Forgery (SSRF) vulnerability that allows attackers to access internal network resources. The vulnerability was discovered in February 2025 and affects both elestio/memos:latest and neosmemo/memos:latest Docker images (GitHub Issue).
The vulnerability exists in the GetLinkMetadata API endpoint due to insufficient validation of user-supplied URLs in the memos-main\plugin\httpgetter\html_meta.go file. The http.Get(urlStr) function within GetHTMLMeta does not properly restrict access to internal network resources, allowing attackers to make requests to arbitrary internal hosts and ports (GitHub Issue).
This vulnerability enables attackers to access internal network assets, perform internal network scanning, sniff web services on the internal network, and potentially access sensitive internal endpoints. Attackers can exploit this to gather information about the internal network infrastructure and potentially access restricted services (GitHub Issue).
A fix has been implemented in pull request #4428 to prevent redirect attacks through the GetLinkMetadata API. The patch adds additional validation to prevent attackers from exploiting redirects to access internal network resources (GitHub PR). Users should upgrade to the latest version that includes this security fix.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."