CVE-2026-7597 PUBLISHED

mem0ai mem0 faiss.py pickle.dump deserialization

Assigner: VulDB
Reserved: 01.05.2026 Published: 01.05.2026 Updated: 01.05.2026

A vulnerability was found in mem0ai mem0 up to 1.0.11. This affects the function pickle.load/pickle.dump of the file mem0/vector_stores/faiss.py. Performing a manipulation results in deserialization. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The patch is named 62dca096f9236010ca15fea9ba369ba740b86b7a. Applying a patch is the recommended action to fix this issue.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 5.3

Product Status

Vendor mem0ai
Product mem0
Versions
  • Version 1.0.0 is affected
  • Version 1.0.1 is affected
  • Version 1.0.2 is affected
  • Version 1.0.3 is affected
  • Version 1.0.4 is affected
  • Version 1.0.5 is affected
  • Version 1.0.6 is affected
  • Version 1.0.7 is affected
  • Version 1.0.8 is affected
  • Version 1.0.9 is affected
  • Version 1.0.10 is affected
  • Version 1.0.11 is affected

Credits

  • edoardottt (VulDB User) reporter

References

Problem Types

  • Deserialization CWE
  • Improper Input Validation CWE