๐Ÿ” CVE Alert

CVE-2026-7597

MEDIUM 6.3

mem0ai mem0 faiss.py pickle.dump deserialization

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in mem0ai mem0 up to 1.0.11. This affects the function pickle.load/pickle.dump of the file mem0/vector_stores/faiss.py. Performing a manipulation results in deserialization. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The patch is named 62dca096f9236010ca15fea9ba369ba740b86b7a. Applying a patch is the recommended action to fix this issue.

CWE CWE-502 CWE-20
Vendor mem0ai
Product mem0
Published May 1, 2026
Stay Ahead of the Next One

Get instant alerts for mem0ai mem0

Be the first to know when new medium vulnerabilities affecting mem0ai mem0 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

mem0ai / mem0
1.0.0 1.0.1 1.0.2 1.0.3 1.0.4 1.0.5 1.0.6 1.0.7 1.0.8 1.0.9 1.0.10 1.0.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/360550 vuldb.com: https://vuldb.com/vuln/360550/cti vuldb.com: https://vuldb.com/submit/805562 github.com: https://github.com/mem0ai/mem0/issues/3778 github.com: https://github.com/mem0ai/mem0/pull/4833 github.com: https://github.com/mem0ai/mem0/commit/62dca096f9236010ca15fea9ba369ba740b86b7a github.com: https://github.com/mem0ai/mem0/

Credits

๐Ÿ” edoardottt (VulDB User)