DROP TABLE on memory storeMITRE service request: 1988584
Status: RESERVED (pending a qualifying public reference per CNA Rules §5.3).
The mem0 1.0.0 server lacks authentication and authorization controls for its memory reset functionality accessible via the DELETE /memories endpoint. An unauthenticated attacker can send a DELETE request that triggers a reset operation, leading to the execution of a DROP TABLE SQL statement. This results in the deletion of the entire memory database table, causing catastrophic data loss and a complete denial of service for all users of the service.
Certain DELETE /memories flows call VectorStoreBase.reset(), which issues DROP TABLE IF EXISTS {collection_name} without authentication. A single anonymous HTTP call can destroy the entire memory table backing all tenants.
5f5e64b44be9be26c6aa223f5c4b538998b8ec8e).DELETE /memories reset branch hitting PGVector.delete_col().DROP TABLE against shared collection name.Critical — single-request database destruction.