CVE-2026-7597
mem0ai mem0 faiss.py pickle.dump deserialization
CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was found in mem0ai mem0 up to 1.0.11. This affects the function pickle.load/pickle.dump of the file mem0/vector_stores/faiss.py. Performing a manipulation results in deserialization. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The patch is named 62dca096f9236010ca15fea9ba369ba740b86b7a. Applying a patch is the recommended action to fix this issue.
| CWE | CWE-502 CWE-20 |
| Vendor | mem0ai |
| Product | mem0 |
| Published | May 1, 2026 |
Stay Ahead of the Next One
Get instant alerts for mem0ai mem0
Be the first to know when new medium vulnerabilities affecting mem0ai mem0 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
mem0ai / mem0
1.0.0 1.0.1 1.0.2 1.0.3 1.0.4 1.0.5 1.0.6 1.0.7 1.0.8 1.0.9 1.0.10 1.0.11
References
vuldb.com: https://vuldb.com/vuln/360550 vuldb.com: https://vuldb.com/vuln/360550/cti vuldb.com: https://vuldb.com/submit/805562 github.com: https://github.com/mem0ai/mem0/issues/3778 github.com: https://github.com/mem0ai/mem0/pull/4833 github.com: https://github.com/mem0ai/mem0/commit/62dca096f9236010ca15fea9ba369ba740b86b7a github.com: https://github.com/mem0ai/mem0/
Credits
๐ edoardottt (VulDB User)