Search criteria
57 vulnerabilities by MongoDB Inc
CVE-2026-2303 (GCVE-0-2026-2303)
Vulnerability from cvelistv5 – Published: 2026-02-10 19:03 – Updated: 2026-02-11 15:16
VLAI?
Title
Heap Out-of-Bounds Read in Go Driver GSSAPI C Wrappers enables application crash or information leak
Summary
The mongo-go-driver repository contains CGo bindings for GSSAPI (Kerberos) authentication on Linux and macOS. The C wrapper implementation contains a heap out-of-bounds read vulnerability due to incorrect assumptions about string termination in the GSSAPI standard. Since GSSAPI buffers are not guaranteed to be null-terminated or have extra padding, this results in reading one byte past the allocated heap buffer.
Severity ?
6.5 (Medium)
CWE
- CWE-183 - Permissive List of Allowed Inputs
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Go Driver |
Affected:
1.0.0 , < 1.17.7
(semver)
Affected: 2.0.0 , < 2.4.2 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-2303",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-11T15:16:06.075674Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-11T15:16:15.789Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Go Driver",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "1.17.7",
"status": "affected",
"version": "1.0.0",
"versionType": "semver"
},
{
"lessThan": "2.4.2",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The mongo-go-driver repository\u0026nbsp;contains CGo bindings for GSSAPI (Kerberos) authentication on Linux and macOS. The C wrapper implementation contains a heap out-of-bounds read vulnerability due to incorrect assumptions about string termination in the GSSAPI standard. Since GSSAPI buffers are not guaranteed to be null-terminated or have extra padding, this results in reading one byte past the allocated heap buffer.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "The mongo-go-driver repository\u00a0contains CGo bindings for GSSAPI (Kerberos) authentication on Linux and macOS. The C wrapper implementation contains a heap out-of-bounds read vulnerability due to incorrect assumptions about string termination in the GSSAPI standard. Since GSSAPI buffers are not guaranteed to be null-terminated or have extra padding, this results in reading one byte past the allocated heap buffer."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-183",
"description": "CWE-183 Permissive List of Allowed Inputs",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T19:03:06.737Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/GODRIVER-3770"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Heap Out-of-Bounds Read in Go Driver GSSAPI C Wrappers enables application crash or information leak",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2026-2303",
"datePublished": "2026-02-10T19:03:06.737Z",
"dateReserved": "2026-02-10T18:55:27.871Z",
"dateUpdated": "2026-02-11T15:16:15.789Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2302 (GCVE-0-2026-2302)
Vulnerability from cvelistv5 – Published: 2026-02-10 18:59 – Updated: 2026-02-10 19:09
VLAI?
Title
Unsafe Reflection in Mongoid::Criteria.from_hash
Summary
Under specific conditions when processing a maliciously crafted value of type Hash r, Mongoid::Criteria.from_hash may allow for executing arbitrary Ruby code.
Severity ?
6.5 (Medium)
CWE
- 183
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Ruby Driver |
Affected:
7.0.0 , ≤ 7.6.1
(semver)
Affected: 8.0.0 , ≤ 8.0.12 (semver) Affected: 8.1.0 , ≤ 8.1.12 (semver) Affected: 9.0.0 , ≤ 9.0.10 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-2302",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-10T19:09:37.837399Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T19:09:44.196Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Ruby Driver",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThanOrEqual": "7.6.1",
"status": "affected",
"version": "7.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.0.12",
"status": "affected",
"version": "8.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1.12",
"status": "affected",
"version": "8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.0.10",
"status": "affected",
"version": "9.0.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Under specific conditions when processing a maliciously crafted value of type Hash r, Mongoid::Criteria.from_hash may allow for executing arbitrary Ruby code.\u003cbr\u003e"
}
],
"value": "Under specific conditions when processing a maliciously crafted value of type Hash r, Mongoid::Criteria.from_hash may allow for executing arbitrary Ruby code."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "183",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T18:59:23.760Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/MONGOID-5919"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Unsafe Reflection in Mongoid::Criteria.from_hash",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2026-2302",
"datePublished": "2026-02-10T18:59:23.760Z",
"dateReserved": "2026-02-10T18:55:25.485Z",
"dateUpdated": "2026-02-10T19:09:44.196Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-25613 (GCVE-0-2026-25613)
Vulnerability from cvelistv5 – Published: 2026-02-10 18:54 – Updated: 2026-02-10 19:15
VLAI?
Title
An unsafe cast in the MongoDB query planner can result in a segmentation fault.
Summary
An authorized user may disable the MongoDB server by issuing a query against a collection that contains an invalid compound wildcard index.
Severity ?
CWE
- CWE-704 - Incorrect Type Conversion or Cast
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
7.0 , < 7.0.29
(semver)
Affected: 8.0 , < 8.0.18 (semver) Affected: 8.2 , < 8.2.4 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-25613",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-10T19:13:57.583214Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T19:15:20.731Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "7.0.29",
"status": "affected",
"version": "7.0",
"versionType": "semver"
},
{
"lessThan": "8.0.18",
"status": "affected",
"version": "8.0",
"versionType": "semver"
},
{
"lessThan": "8.2.4",
"status": "affected",
"version": "8.2",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An authorized user may disable the MongoDB server by issuing a query against a collection that contains an invalid compound wildcard index."
}
],
"value": "An authorized user may disable the MongoDB server by issuing a query against a collection that contains an invalid compound wildcard index."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-704",
"description": "CWE-704 Incorrect Type Conversion or Cast",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T18:54:50.376Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-113685"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "An unsafe cast in the MongoDB query planner can result in a segmentation fault.",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2026-25613",
"datePublished": "2026-02-10T18:54:50.376Z",
"dateReserved": "2026-02-03T18:21:58.986Z",
"dateUpdated": "2026-02-10T19:15:20.731Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-1849 (GCVE-0-2026-1849)
Vulnerability from cvelistv5 – Published: 2026-02-10 18:52 – Updated: 2026-02-10 19:17
VLAI?
Title
Mongod can run out of stack memory when expressions create deeply nested documents
Summary
MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce deeply nested documents. The issue arises in recursive functions because the server does not periodically check the depth of the expression.
Severity ?
CWE
- CWE-674 - Uncontrolled Recursion
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
8.0 , < 8.0.18
(semver)
Affected: 7.0 , < 7.0.29 (semver) Affected: 8.2 , < 8.2.2 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-1849",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-10T19:16:27.778333Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T19:17:02.296Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "8.0.18",
"status": "affected",
"version": "8.0",
"versionType": "semver"
},
{
"lessThan": "7.0.29",
"status": "affected",
"version": "7.0",
"versionType": "semver"
},
{
"lessThan": "8.2.2",
"status": "affected",
"version": "8.2",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce deeply nested documents. The issue arises in recursive functions because the server does not periodically check the depth of the expression."
}
],
"value": "MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce deeply nested documents. The issue arises in recursive functions because the server does not periodically check the depth of the expression."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-674",
"description": "CWE-674 Uncontrolled Recursion",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T18:52:52.737Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-102364"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Mongod can run out of stack memory when expressions create deeply nested documents",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2026-1849",
"datePublished": "2026-02-10T18:52:52.737Z",
"dateReserved": "2026-02-03T18:21:52.859Z",
"dateUpdated": "2026-02-10T19:17:02.296Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-1850 (GCVE-0-2026-1850)
Vulnerability from cvelistv5 – Published: 2026-02-10 18:49 – Updated: 2026-02-10 19:18
VLAI?
Title
An authorized user may disable the MongoDB server by issuing a certain type of complex query due to boolean expression simplification
Summary
Complex queries can cause excessive memory usage in MongoDB Query Planner resulting in an Out-Of-Memory Crash.
Severity ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
8.0 , < 8.0.18
(semver)
Affected: 8.2 , < 8.2.4 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-1850",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-10T19:18:16.858032Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T19:18:26.224Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "8.0.18",
"status": "affected",
"version": "8.0",
"versionType": "semver"
},
{
"lessThan": "8.2.4",
"status": "affected",
"version": "8.2",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Complex queries can cause excessive memory usage in MongoDB Query Planner resulting in an Out-Of-Memory Crash.\u003cbr\u003e"
}
],
"value": "Complex queries can cause excessive memory usage in MongoDB Query Planner resulting in an Out-Of-Memory Crash."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770 Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T18:49:32.084Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-114126"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "An authorized user may disable the MongoDB server by issuing a certain type of complex query due to boolean expression simplification",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2026-1850",
"datePublished": "2026-02-10T18:49:32.084Z",
"dateReserved": "2026-02-03T18:21:53.785Z",
"dateUpdated": "2026-02-10T19:18:26.224Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-25609 (GCVE-0-2026-25609)
Vulnerability from cvelistv5 – Published: 2026-02-10 18:39 – Updated: 2026-02-10 19:52
VLAI?
Title
profile command may permit unauthorized configuration
Summary
Incorrect validation of the profile command may result in the determination that a request altering the 'filter' is read-only.
Severity ?
5.4 (Medium)
CWE
- CWE-862 - Missing Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
8.2 , < 8.2.4
(semver)
Affected: 8.0 , < 8.0.18 (semver) Affected: 7.0 , < 7.0.29 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-25609",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-10T19:37:32.976979Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T19:52:07.572Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "8.2.4",
"status": "affected",
"version": "8.2",
"versionType": "semver"
},
{
"lessThan": "8.0.18",
"status": "affected",
"version": "8.0",
"versionType": "semver"
},
{
"lessThan": "7.0.29",
"status": "affected",
"version": "7.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Incorrect validation of the profile command may result in the determination that a request altering the \u0027filter\u0027 is read-only.\u003cbr\u003e"
}
],
"value": "Incorrect validation of the profile command may result in the determination that a request altering the \u0027filter\u0027 is read-only."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-862",
"description": "CWE-862 Missing Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T18:39:11.201Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-112952"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "profile command may permit unauthorized configuration",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2026-25609",
"datePublished": "2026-02-10T18:39:11.201Z",
"dateReserved": "2026-02-03T18:21:58.985Z",
"dateUpdated": "2026-02-10T19:52:07.572Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-25610 (GCVE-0-2026-25610)
Vulnerability from cvelistv5 – Published: 2026-02-10 18:30 – Updated: 2026-02-10 20:29
VLAI?
Title
Invalid $geoNear index hint may cause server crash
Summary
An authorized user may trigger a server crash by running a $geoNear pipeline with certain invalid index hints.
Severity ?
CWE
- CWE-617 - Reachable Assertion
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
8.0 , < 8.0.13
(semver)
Affected: 7.0 , < 7.0.29 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-25610",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-10T20:29:38.183923Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T20:29:51.688Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "8.0.13",
"status": "affected",
"version": "8.0",
"versionType": "semver"
},
{
"lessThan": "7.0.29",
"status": "affected",
"version": "7.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An authorized user may trigger a server crash by running a $geoNear pipeline with certain invalid index hints.\u003cbr\u003e"
}
],
"value": "An authorized user may trigger a server crash by running a $geoNear pipeline with certain invalid index hints."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-617",
"description": "CWE-617 Reachable Assertion",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T18:30:40.756Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-99119"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Invalid $geoNear index hint may cause server crash",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2026-25610",
"datePublished": "2026-02-10T18:30:40.756Z",
"dateReserved": "2026-02-03T18:21:58.985Z",
"dateUpdated": "2026-02-10T20:29:51.688Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-1848 (GCVE-0-2026-1848)
Vulnerability from cvelistv5 – Published: 2026-02-10 18:22 – Updated: 2026-02-11 15:17
VLAI?
Title
Connections received from the proxy port may not count towards total accepted connections
Summary
Connections received from the proxy port may not count towards total accepted connections, resulting in server crashes if the total number of connections exceeds available resources. This only applies to connections accepted from the proxy port, pending the proxy protocol header.
Severity ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
8.2 , < 8.2.4
(semver)
Affected: 8.0 , < 8.0.18 (semver) Affected: 7.0 , < 7.0.29 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-1848",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-11T15:16:52.444535Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-11T15:17:01.970Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "8.2.4",
"status": "affected",
"version": "8.2",
"versionType": "semver"
},
{
"lessThan": "8.0.18",
"status": "affected",
"version": "8.0",
"versionType": "semver"
},
{
"lessThan": "7.0.29",
"status": "affected",
"version": "7.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Connections received from the proxy port may not count towards total accepted connections, resulting in server crashes if the total number of connections exceeds available resources. This only applies to connections accepted from the proxy port, pending the proxy protocol header.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Connections received from the proxy port may not count towards total accepted connections, resulting in server crashes if the total number of connections exceeds available resources. This only applies to connections accepted from the proxy port, pending the proxy protocol header."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770 Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T18:22:41.971Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-114695"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Connections received from the proxy port may not count towards total accepted connections",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2026-1848",
"datePublished": "2026-02-10T18:22:41.971Z",
"dateReserved": "2026-02-03T18:21:51.892Z",
"dateUpdated": "2026-02-11T15:17:01.970Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-1847 (GCVE-0-2026-1847)
Vulnerability from cvelistv5 – Published: 2026-02-10 18:16 – Updated: 2026-02-10 20:12
VLAI?
Title
MongoDB Server may crash when inserting large documents
Summary
Inserting certain large documents into a replica set could lead to replica set secondaries not being able to fetch the oplog from the primary. This could stall replication inside the replica set leading to server crash.
Severity ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
8.0 , < 8.0.18
(semver)
Affected: 7.0 , < 7.0.29 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-1847",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-10T20:11:52.934322Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T20:12:18.968Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "8.0.18",
"status": "affected",
"version": "8.0",
"versionType": "semver"
},
{
"lessThan": "7.0.29",
"status": "affected",
"version": "7.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Inserting certain large documents into a replica set could lead to replica set secondaries not being able to fetch the oplog from the primary. This could stall replication inside the replica set leading to server crash."
}
],
"value": "Inserting certain large documents into a replica set could lead to replica set secondaries not being able to fetch the oplog from the primary. This could stall replication inside the replica set leading to server crash."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770 Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T18:16:24.739Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-113532"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "MongoDB Server may crash when inserting large documents",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2026-1847",
"datePublished": "2026-02-10T18:16:24.739Z",
"dateReserved": "2026-02-03T18:21:50.648Z",
"dateUpdated": "2026-02-10T20:12:18.968Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-25612 (GCVE-0-2026-25612)
Vulnerability from cvelistv5 – Published: 2026-02-10 18:05 – Updated: 2026-02-10 18:59
VLAI?
Title
Internal ResourceId collision may affect unrelated collections
Summary
The internal locking mechanism of the MongoDB server uses an internal encoding of the resources in order to choose what lock to take. Collections may inadvertently collide with one another in this representation causing unavailability between them due to conflicting locks.
Severity ?
CWE
- CWE-412 - Unrestricted Externally Accessible Lock
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
8.2 , < 8.2.4
(semver)
Affected: 8.0 , < 8.0.18 (semver) Affected: 7.0 , < 7.0.29 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-25612",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-10T18:59:20.305133Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T18:59:27.442Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "8.2.4",
"status": "affected",
"version": "8.2",
"versionType": "semver"
},
{
"lessThan": "8.0.18",
"status": "affected",
"version": "8.0",
"versionType": "semver"
},
{
"lessThan": "7.0.29",
"status": "affected",
"version": "7.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The internal locking mechanism of the MongoDB server uses an internal encoding of the resources in order to choose what lock to take. Collections may inadvertently collide with one another in this representation causing unavailability between them due to conflicting locks."
}
],
"value": "The internal locking mechanism of the MongoDB server uses an internal encoding of the resources in order to choose what lock to take. Collections may inadvertently collide with one another in this representation causing unavailability between them due to conflicting locks."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-412",
"description": "CWE-412 Unrestricted Externally Accessible Lock",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T18:05:23.851Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-114838"
},
{
"url": "https://jira.mongodb.org/browse/SERVER-115296"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Internal ResourceId collision may affect unrelated collections",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2026-25612",
"datePublished": "2026-02-10T18:05:23.851Z",
"dateReserved": "2026-02-03T18:21:58.986Z",
"dateUpdated": "2026-02-10T18:59:27.442Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-25611 (GCVE-0-2026-25611)
Vulnerability from cvelistv5 – Published: 2026-02-10 17:52 – Updated: 2026-02-11 15:21
VLAI?
Title
Pre-Authentication Memory Exhaustion Denial of Service in MongoDB Server
Summary
A series of specifically crafted, unauthenticated messages can exhaust available memory and crash a MongoDB server.
Severity ?
CWE
- CWE-405 - Asymmetric Resource Consumption (Amplification)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
8.2 , < 8.2.4
(semver)
Affected: 8.0 , < 8.0.18 (semver) Affected: 7.0 , < 7.0.29 (semver) |
Credits
Vitaly Simonovich
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-25611",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-11T15:20:57.244281Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-11T15:21:16.207Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "8.2.4",
"status": "affected",
"version": "8.2",
"versionType": "semver"
},
{
"lessThan": "8.0.18",
"status": "affected",
"version": "8.0",
"versionType": "semver"
},
{
"lessThan": "7.0.29",
"status": "affected",
"version": "7.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Vitaly Simonovich"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A series of specifically crafted, unauthenticated messages can exhaust available memory and crash a MongoDB server."
}
],
"value": "A series of specifically crafted, unauthenticated messages can exhaust available memory and crash a MongoDB server."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-405",
"description": "CWE-405 Asymmetric Resource Consumption (Amplification)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T17:52:47.181Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-116210"
},
{
"url": "https://jira.mongodb.org/browse/SERVER-116206"
},
{
"url": "https://jira.mongodb.org/browse/SERVER-116211"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Pre-Authentication Memory Exhaustion Denial of Service in MongoDB Server",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2026-25611",
"datePublished": "2026-02-10T17:52:47.181Z",
"dateReserved": "2026-02-03T18:21:58.986Z",
"dateUpdated": "2026-02-11T15:21:16.207Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-11535 (GCVE-0-2025-11535)
Vulnerability from cvelistv5 – Published: 2025-10-08 22:07 – Updated: 2025-10-10 03:55
VLAI?
Title
MongoDB Connector for BI installation MSI leave ACLs unset on custom installation directories
Summary
MongoDB Connector for BI installation via MSI on Windows leaves ACLs unset on custom install directories allows Privilege Escalation.This issue affects MongoDB Connector for BI: from 2.0.0 through 2.14.24.
Severity ?
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Connector for BI |
Affected:
2.0.0 , ≤ 2.14.24
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-11535",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-09T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-10T03:55:24.212Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "MongoDB Connector for BI",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThanOrEqual": "2.14.24",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-10-08T21:26:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "MongoDB Connector for BI installation via\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMSI\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eon Windows \u003c/span\u003eleaves ACLs unset on custom install directories allows Privilege Escalation.\u003cp\u003eThis issue affects MongoDB Connector for BI: from 2.0.0 through 2.14.24.\u003c/p\u003e"
}
],
"value": "MongoDB Connector for BI installation via\u00a0MSI\u00a0on Windows leaves ACLs unset on custom install directories allows Privilege Escalation.This issue affects MongoDB Connector for BI: from 2.0.0 through 2.14.24."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "CWE-276 Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-08T22:07:18.498Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://www.mongodb.com/docs/bi-connector/current/release-notes/#bi-2.14.25"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MongoDB Connector for BI installation MSI leave ACLs unset on custom installation directories",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-11535",
"datePublished": "2025-10-08T22:07:18.498Z",
"dateReserved": "2025-10-08T21:16:03.837Z",
"dateUpdated": "2025-10-10T03:55:24.212Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-10491 (GCVE-0-2025-10491)
Vulnerability from cvelistv5 – Published: 2025-09-15 16:04 – Updated: 2025-09-16 03:55
VLAI?
Title
MongoDB Windows installation MSI may leave ACLs unset on custom installation directories
Summary
The MongoDB Windows installation MSI may leave ACLs unset on custom installation directories allowing a local attacker to introduce executable code to MongoDB's process via DLL hijacking. This issue affects MongoDB Server v6.0 version prior to 6.0.25, MongoDB Server v7.0 version prior to 7.0.21 and MongoDB Server v8.0 version prior to 8.0.5
Severity ?
7.8 (High)
CWE
- CWE-284 - Improper Access Control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
6.0 , < 6.0.25
(custom)
Affected: 7.0 , < 7.0.21 (custom) Affected: 8.0 , < 8.0.5 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-10491",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-15T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-16T03:55:21.417Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "6.0.25",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.21",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.5",
"status": "affected",
"version": "8.0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThe MongoDB Windows installation MSI may leave ACLs unset on custom installation directories allowing a local attacker to introduce executable code to MongoDB\u0027s process via DLL hijacking. This issue affects MongoDB Server v6.0 version prior to 6.0.25, MongoDB Server v7.0 version prior to 7.0.21 and MongoDB Server v8.0 version prior to 8.0.5\u003c/p\u003e"
}
],
"value": "The MongoDB Windows installation MSI may leave ACLs unset on custom installation directories allowing a local attacker to introduce executable code to MongoDB\u0027s process via DLL hijacking. This issue affects MongoDB Server v6.0 version prior to 6.0.25, MongoDB Server v7.0 version prior to 7.0.21 and MongoDB Server v8.0 version prior to 8.0.5"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284: Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-15T16:04:54.221Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-51366"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "MongoDB Windows installation MSI may leave ACLs unset on custom installation directories",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-10491",
"datePublished": "2025-09-15T16:04:54.221Z",
"dateReserved": "2025-09-15T15:57:35.554Z",
"dateUpdated": "2025-09-16T03:55:21.417Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-10061 (GCVE-0-2025-10061)
Vulnerability from cvelistv5 – Published: 2025-09-05 20:48 – Updated: 2025-09-05 21:08
VLAI?
Title
Malformed $group Query May Cause MongoDB Server to Crash
Summary
An authorized user can cause a crash in the MongoDB Server through a specially crafted $group query. This vulnerability is related to the incorrect handling of certain accumulator functions when additional parameters are specified within the $group operation. This vulnerability could lead to denial of service if triggered repeatedly. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22, MongoDB Server v8.0 versions prior to 8.0.12 and MongoDB Server v8.1 versions prior to 8.1.2
Severity ?
6.5 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
6.0 , < 6.0.25
(custom)
Affected: 7.0 , < 7.0.22 (custom) Affected: 8.0 , < 8.0.12 (custom) Affected: 8.1 , < 8.1.2 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-10061",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-05T21:07:15.019864Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-05T21:08:44.186Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "6.0.25",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.22",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.12",
"status": "affected",
"version": "8.0",
"versionType": "custom"
},
{
"lessThan": "8.1.2",
"status": "affected",
"version": "8.1",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An authorized user can cause a crash in the MongoDB Server through a specially crafted $group query. This vulnerability is related to the incorrect handling of certain accumulator functions when additional parameters are specified within the $group operation. This vulnerability could lead to denial of service if triggered repeatedly. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22, MongoDB Server v8.0 versions prior to 8.0.12 and MongoDB Server v8.1 versions prior to 8.1.2"
}
],
"value": "An authorized user can cause a crash in the MongoDB Server through a specially crafted $group query. This vulnerability is related to the incorrect handling of certain accumulator functions when additional parameters are specified within the $group operation. This vulnerability could lead to denial of service if triggered repeatedly. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22, MongoDB Server v8.0 versions prior to 8.0.12 and MongoDB Server v8.1 versions prior to 8.1.2"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-05T20:48:25.215Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-99616"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Malformed $group Query May Cause MongoDB Server to Crash",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-10061",
"datePublished": "2025-09-05T20:48:25.215Z",
"dateReserved": "2025-09-05T20:41:48.167Z",
"dateUpdated": "2025-09-05T21:08:44.186Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-10060 (GCVE-0-2025-10060)
Vulnerability from cvelistv5 – Published: 2025-09-05 20:39 – Updated: 2025-09-05 21:08
VLAI?
Title
MongoDB may be susceptible to Invariant Failure in Transactions due Upsert Operation
Summary
MongoDB Server may allow upsert operations retried within a transaction to violate unique index constraints, potentially causing an invariant failure and server crash during commit. This issue may be triggered by improper WriteUnitOfWork state management. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22 and MongoDB Server v8.0 versions prior to 8.0.12
Severity ?
6.5 (Medium)
CWE
- CWE-672 - Operation on a Resource after Expiration or Release
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
6.0 , < 6.0.25
(custom)
Affected: 7.0 , < 7.0.22 (custom) Affected: 8.0 , < 8.0.12 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-10060",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-05T21:07:23.024155Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-05T21:08:05.687Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "6.0.25",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.22",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.12",
"status": "affected",
"version": "8.0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "MongoDB Server may allow upsert operations retried within a transaction to violate unique index constraints, potentially causing an invariant failure and server crash during commit. This issue may be triggered by improper WriteUnitOfWork state management. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22 and MongoDB Server v8.0 versions prior to 8.0.12"
}
],
"value": "MongoDB Server may allow upsert operations retried within a transaction to violate unique index constraints, potentially causing an invariant failure and server crash during commit. This issue may be triggered by improper WriteUnitOfWork state management. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22 and MongoDB Server v8.0 versions prior to 8.0.12"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-672",
"description": "CWE-672 Operation on a Resource after Expiration or Release",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-05T20:39:14.188Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-95524"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MongoDB may be susceptible to Invariant Failure in Transactions due Upsert Operation",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-10060",
"datePublished": "2025-09-05T20:39:14.188Z",
"dateReserved": "2025-09-05T20:28:10.874Z",
"dateUpdated": "2025-09-05T21:08:05.687Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-10059 (GCVE-0-2025-10059)
Vulnerability from cvelistv5 – Published: 2025-09-05 20:26 – Updated: 2025-09-05 20:44
VLAI?
Title
MongoDB Server router will crash when incorrect lsid is set on a sharded query
Summary
An improper setting of the lsid field on any sharded query can cause a crash in MongoDB routers. This issue occurs when a generic argument (lsid) is provided in a case when it is not applicable. This affects MongoDB Server v6.0 versions prior to 6.0.x, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v8.0 versions prior to 8.0.6.
Severity ?
6.5 (Medium)
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
6.0 , < 6.0.24
(custom)
Affected: 7.0 , < 7.0.18 (custom) Affected: 8.0 , < 8.0.6 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-10059",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-05T20:43:05.307135Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-05T20:44:22.665Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "6.0.24",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.18",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.6",
"status": "affected",
"version": "8.0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: transparent;\"\u003eAn improper setting of the lsid field on any sharded query can cause a crash in MongoDB routers. This issue occurs when a generic argument (lsid) is provided in a case when it is not applicable. This affects MongoDB Server v6.0 versions prior to 6.0.x, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v8.0 versions prior to 8.0.6.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "An improper setting of the lsid field on any sharded query can cause a crash in MongoDB routers. This issue occurs when a generic argument (lsid) is provided in a case when it is not applicable. This affects MongoDB Server v6.0 versions prior to 6.0.x, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v8.0 versions prior to 8.0.6."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-05T20:26:52.612Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-100901"
},
{
"url": "https://jira.mongodb.org/browse/SERVER-100909"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "MongoDB Server router will crash when incorrect lsid is set on a sharded query",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-10059",
"datePublished": "2025-09-05T20:26:52.612Z",
"dateReserved": "2025-09-05T20:10:54.977Z",
"dateUpdated": "2025-09-05T20:44:22.665Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-7259 (GCVE-0-2025-7259)
Vulnerability from cvelistv5 – Published: 2025-07-07 15:59 – Updated: 2025-07-07 16:13
VLAI?
Title
Certain Queries with Duplicate _id Fields May Cause MongoDB Server to Crash
Summary
An authorized user can issue queries with duplicate _id fields, that leads to unexpected behavior in MongoDB Server, which may result to crash. This issue can only be triggered by authorized users and cause Denial of Service. This issue affects MongoDB Server v8.1 version 8.1.0.
Severity ?
6.5 (Medium)
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
8.1 , ≤ 8.1.0
(custom)
cpe:2.3:a:mongodb:mongodb:8.1.0:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-7259",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-07T16:13:43.106144Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-07T16:13:48.353Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:8.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThanOrEqual": "8.1.0",
"status": "affected",
"version": "8.1",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-07-07T15:06:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn authorized user can issue queries with duplicate _id fields, that leads to unexpected behavior in MongoDB Server, which may result to crash. This issue can only be triggered by authorized users and cause Denial of Service. This issue affects MongoDB Server v8.1 version 8.1.0.\u003c/p\u003e"
}
],
"value": "An authorized user can issue queries with duplicate _id fields, that leads to unexpected behavior in MongoDB Server, which may result to crash. This issue can only be triggered by authorized users and cause Denial of Service. This issue affects MongoDB Server v8.1 version 8.1.0."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-843",
"description": "CWE-843: Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-07T15:59:01.902Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-102693"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Certain Queries with Duplicate _id Fields May Cause MongoDB Server to Crash",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-7259",
"datePublished": "2025-07-07T15:59:01.902Z",
"dateReserved": "2025-07-07T15:05:32.437Z",
"dateUpdated": "2025-07-07T16:13:48.353Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6714 (GCVE-0-2025-6714)
Vulnerability from cvelistv5 – Published: 2025-07-07 14:48 – Updated: 2025-07-07 19:11
VLAI?
Title
Incorrect Handling of incomplete data may prevent mongoS from Accepting New Connections
Summary
MongoDB Server's mongos component can become unresponsive to new connections due to incorrect handling of incomplete data. This affects MongoDB when configured with load balancer support. This issue affects MongoDB Server v6.0 prior to 6.0.23, MongoDB Server v7.0 prior to 7.0.20 and MongoDB Server v8.0 prior to 8.0.9
Required Configuration:
This affects MongoDB sharded clusters when configured with load balancer support for mongos using HAProxy on specified ports.
Severity ?
7.5 (High)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
6.0 , < 6.0.23
(custom)
Affected: 7.0 , < 7.0.20 (custom) Affected: 8.0 , < 8.0.9 (custom) cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.21:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.22:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.8:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6714",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-07T19:11:36.252213Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-07T19:11:47.975Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "6.0.23",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.20",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.9",
"status": "affected",
"version": "8.0",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003e\u003cp\u003eThis affects MongoDB sharded clusters when configured with load balancer support for mongos using HAProxy on specified ports.\u003c/p\u003e\u003c/div\u003e"
}
],
"value": "This affects MongoDB sharded clusters when configured with load balancer support for mongos using HAProxy on specified ports."
}
],
"datePublic": "2025-07-07T14:45:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMongoDB Server\u0027s mongos component can become unresponsive to new connections due to incorrect handling of incomplete data. This affects MongoDB when configured with load balancer support. This issue affects MongoDB Server v6.0 prior to 6.0.23, MongoDB Server v7.0 prior to 7.0.20 and MongoDB Server v8.0 prior to 8.0.9\u003c/p\u003e\u003cp\u003e\u003cb\u003eRequired Configuration:\u003c/b\u003e\u003c/p\u003e\u003cp\u003eThis affects MongoDB sharded clusters when configured with load balancer support for mongos using HAProxy on specified ports.\u003c/p\u003e"
}
],
"value": "MongoDB Server\u0027s mongos component can become unresponsive to new connections due to incorrect handling of incomplete data. This affects MongoDB when configured with load balancer support. This issue affects MongoDB Server v6.0 prior to 6.0.23, MongoDB Server v7.0 prior to 7.0.20 and MongoDB Server v8.0 prior to 8.0.9\n\nRequired Configuration:\n\nThis affects MongoDB sharded clusters when configured with load balancer support for mongos using HAProxy on specified ports."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-834",
"description": "CWE-834 Excessive Iteration",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-07T14:48:48.312Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-106753"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Incorrect Handling of incomplete data may prevent mongoS from Accepting New Connections",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-6714",
"datePublished": "2025-07-07T14:48:48.312Z",
"dateReserved": "2025-06-26T11:58:50.544Z",
"dateUpdated": "2025-07-07T19:11:47.975Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6713 (GCVE-0-2025-6713)
Vulnerability from cvelistv5 – Published: 2025-07-07 14:46 – Updated: 2025-07-18 05:50
VLAI?
Title
MongoDB Server may be susceptible to privilege escalation due to $mergeCursors stage
Summary
An unauthorized user may leverage a specially crafted aggregation pipeline to access data without proper authorization due to improper handling of the $mergeCursors stage in MongoDB Server. This may lead to access to data without further authorisation. This issue affects MongoDB Server MongoDB Server v8.0 versions prior to 8.0.7, MongoDB Server v7.0 versions prior to 7.0.19 and MongoDB Server v6.0 versions prior to 6.0.22
Severity ?
7.7 (High)
CWE
- CWE-285 - Improper Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
6.0 , < 6.0.22
(custom)
Affected: 7.0 , < 7.0.19 (custom) Affected: 8.0 , < 8.0.7 (custom) cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.21:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.6:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6713",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-07T19:11:00.438009Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-07T19:11:13.152Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.6:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "6.0.22",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.19",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.7",
"status": "affected",
"version": "8.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-07-07T14:45:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn unauthorized user may leverage a specially crafted aggregation pipeline to access data without proper authorization due to improper handling of the $mergeCursors stage in MongoDB Server. This may lead to access to data without further authorisation. This issue affects MongoDB Server MongoDB Server v8.0 versions prior to 8.0.7, MongoDB Server v7.0 versions prior to 7.0.19 and MongoDB Server v6.0 versions prior to 6.0.22\u003c/p\u003e"
}
],
"value": "An unauthorized user may leverage a specially crafted aggregation pipeline to access data without proper authorization due to improper handling of the $mergeCursors stage in MongoDB Server. This may lead to access to data without further authorisation. This issue affects MongoDB Server MongoDB Server v8.0 versions prior to 8.0.7, MongoDB Server v7.0 versions prior to 7.0.19 and MongoDB Server v6.0 versions prior to 6.0.22"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285: Improper Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-18T05:50:23.153Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-106752"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MongoDB Server may be susceptible to privilege escalation due to $mergeCursors stage",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-6713",
"datePublished": "2025-07-07T14:46:36.201Z",
"dateReserved": "2025-06-26T11:52:57.357Z",
"dateUpdated": "2025-07-18T05:50:23.153Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6712 (GCVE-0-2025-6712)
Vulnerability from cvelistv5 – Published: 2025-07-07 14:44 – Updated: 2025-07-07 14:53
VLAI?
Title
MongoDB Server may be susceptible to DoS due to Accumulated Memory Allocation
Summary
MongoDB Server may be susceptible to disruption caused by high memory usage, potentially leading to server crash. This condition is linked to inefficiencies in memory management related to internal operations. In scenarios where certain internal processes persist longer than anticipated, memory consumption can increase, potentially impacting server stability and availability. This issue affects MongoDB Server v8.0 versions prior to 8.0.10
Severity ?
6.5 (Medium)
CWE
- CWE-400 - Uncontrolled Resource Consumption
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
8.0 , < 8.0.10
(custom)
cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.9:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6712",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-07T14:53:35.680320Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-07T14:53:47.097Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.9:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "8.0.10",
"status": "affected",
"version": "8.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-07-07T14:45:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMongoDB Server may be susceptible to disruption caused by high memory usage, potentially leading to server crash. This condition is linked to inefficiencies in memory management related to internal operations. In scenarios where certain internal processes persist longer than anticipated, memory consumption can increase, potentially impacting server stability and availability. This issue affects MongoDB Server v8.0 versions prior to 8.0.10\u003c/p\u003e"
}
],
"value": "MongoDB Server may be susceptible to disruption caused by high memory usage, potentially leading to server crash. This condition is linked to inefficiencies in memory management related to internal operations. In scenarios where certain internal processes persist longer than anticipated, memory consumption can increase, potentially impacting server stability and availability. This issue affects MongoDB Server v8.0 versions prior to 8.0.10"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400: Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-07T14:45:55.924Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-106751"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MongoDB Server may be susceptible to DoS due to Accumulated Memory Allocation",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-6712",
"datePublished": "2025-07-07T14:44:38.183Z",
"dateReserved": "2025-06-26T11:48:56.095Z",
"dateUpdated": "2025-07-07T14:53:47.097Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6711 (GCVE-0-2025-6711)
Vulnerability from cvelistv5 – Published: 2025-07-07 14:42 – Updated: 2025-07-07 14:58
VLAI?
Title
Incomplete Redaction of Sensitive Information in MongoDB Server Logs
Summary
An issue has been identified in MongoDB Server where unredacted queries may inadvertently appear in server logs when certain error conditions are encountered. This issue affects MongoDB Server v8.0 versions prior to 8.0.5, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v6.0 versions prior to 6.0.21.
Severity ?
4.4 (Medium)
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
6.0 , < 6.0.21
(custom)
Affected: 7.0 , < 7.0.18 (custom) Affected: 8.0 , < 8.0.5 (custom) cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6711",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-07T14:56:14.136564Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-07T14:58:08.477Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "6.0.21",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.18",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.5",
"status": "affected",
"version": "8.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-07-07T14:40:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn issue has been identified in MongoDB Server where unredacted queries may inadvertently appear in server logs when certain error conditions are encountered. This issue affects MongoDB Server v8.0 versions prior to 8.0.5, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v6.0 versions prior to 6.0.21.\u003c/p\u003e"
}
],
"value": "An issue has been identified in MongoDB Server where unredacted queries may inadvertently appear in server logs when certain error conditions are encountered. This issue affects MongoDB Server v8.0 versions prior to 8.0.5, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v6.0 versions prior to 6.0.21."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-532",
"description": "CWE-532: Insertion of Sensitive Information into Log File",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-07T14:42:16.562Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-98720"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Incomplete Redaction of Sensitive Information in MongoDB Server Logs",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-6711",
"datePublished": "2025-07-07T14:42:16.562Z",
"dateReserved": "2025-06-26T11:44:16.283Z",
"dateUpdated": "2025-07-07T14:58:08.477Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6710 (GCVE-0-2025-6710)
Vulnerability from cvelistv5 – Published: 2025-06-26 14:09 – Updated: 2025-06-26 17:35
VLAI?
Title
Pre-authentication Denial of Service Stack Overflow Vulnerability in JSON Parsing via Excessive Recursion in MongoDB
Summary
MongoDB Server may be susceptible to stack overflow due to JSON parsing mechanism, where specifically crafted JSON inputs may induce unwarranted levels of recursion, resulting in excessive stack space consumption. Such inputs can lead to a stack overflow that causes the server to crash which could occur pre-authorisation. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.
The same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating.
Severity ?
7.5 (High)
CWE
- CWE-674 - Uncontrolled Recursion
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
6.0 , < 6.0.21
(custom)
Affected: 7.0 , < 7.0.17 (custom) Affected: 8.0 , < 8.0.5 (custom) cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6710",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-26T17:34:54.163744Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-26T17:35:01.659Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "6.0.21",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.17",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.5",
"status": "affected",
"version": "8.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-06-26T11:40:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMongoDB Server may be susceptible to stack overflow due to JSON parsing mechanism, where specifically crafted JSON inputs may induce unwarranted levels of recursion, resulting in excessive stack space consumption. Such inputs can lead to a stack overflow that causes the server to crash which could occur pre-authorisation. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.\u003c/p\u003e\u003cp\u003eThe same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating.\u003c/p\u003e"
}
],
"value": "MongoDB Server may be susceptible to stack overflow due to JSON parsing mechanism, where specifically crafted JSON inputs may induce unwarranted levels of recursion, resulting in excessive stack space consumption. Such inputs can lead to a stack overflow that causes the server to crash which could occur pre-authorisation. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.\n\nThe same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-674",
"description": "CWE-674: Uncontrolled Recursion",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-26T14:09:29.581Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-106749"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Pre-authentication Denial of Service Stack Overflow Vulnerability in JSON Parsing via Excessive Recursion in MongoDB",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-6710",
"datePublished": "2025-06-26T14:09:29.581Z",
"dateReserved": "2025-06-26T11:38:14.955Z",
"dateUpdated": "2025-06-26T17:35:01.659Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6709 (GCVE-0-2025-6709)
Vulnerability from cvelistv5 – Published: 2025-06-26 14:07 – Updated: 2025-06-26 17:39
VLAI?
Title
Pre-Authentication Denial of Service Vulnerability in MongoDB Server's OIDC Authentication
Summary
The MongoDB Server is susceptible to a denial of service vulnerability due to improper handling of specific date values in JSON input when using OIDC authentication. This can be reproduced using the mongo shell to send a malicious JSON payload leading to an invariant failure and server crash. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.
The same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating.
Severity ?
7.5 (High)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
7.0 , < 7.0.17
(custom)
Affected: 8.0 , < 8.0.5 (custom) Affected: 6.0 , < 6.0.21 (custom) cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6709",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-26T17:39:05.900969Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-26T17:39:12.683Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "7.0.17",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.5",
"status": "affected",
"version": "8.0",
"versionType": "custom"
},
{
"lessThan": "6.0.21",
"status": "affected",
"version": "6.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-06-26T11:32:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThe MongoDB Server is susceptible to a denial of service vulnerability due to improper handling of specific date values in JSON input when using OIDC authentication. This can be reproduced using the mongo shell to send a malicious JSON payload leading to an invariant failure and server crash. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.\u003c/p\u003e\u003cp\u003eThe same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating.\u003c/p\u003e"
}
],
"value": "The MongoDB Server is susceptible to a denial of service vulnerability due to improper handling of specific date values in JSON input when using OIDC authentication. This can be reproduced using the mongo shell to send a malicious JSON payload leading to an invariant failure and server crash. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.\n\nThe same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-26T14:07:04.979Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-106748"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Pre-Authentication Denial of Service Vulnerability in MongoDB Server\u0027s OIDC Authentication",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-6709",
"datePublished": "2025-06-26T14:07:04.979Z",
"dateReserved": "2025-06-26T11:28:51.253Z",
"dateUpdated": "2025-06-26T17:39:12.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6707 (GCVE-0-2025-6707)
Vulnerability from cvelistv5 – Published: 2025-06-26 14:04 – Updated: 2025-06-27 03:55
VLAI?
Title
Race condition in privilege cache invalidation cycle
Summary
Under certain conditions, an authenticated user request may execute with stale privileges following an intentional change by an authorized administrator. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.24, MongoDB Server v7.0 version prior to 7.0.21 and MongoDB Server v8.0 version prior to 8.0.5.
Severity ?
4.2 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
5.0 , < 5.0.31
(custom)
Affected: 6.0 , < 6.0.24 (custom) Affected: 7.0 , < 7.0.21 (custom) Affected: 8.0 , < 8.0.5 (custom) cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.21:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.22:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.23:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6707",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-26T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-27T03:55:27.008Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "5.0.31",
"status": "affected",
"version": "5.0",
"versionType": "custom"
},
{
"lessThan": "6.0.24",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.21",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.5",
"status": "affected",
"version": "8.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-06-26T11:09:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Under certain conditions, an authenticated user request may execute with stale privileges following an intentional change by an authorized administrator. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.24, MongoDB Server v7.0 version prior to 7.0.21 and MongoDB Server v8.0 version prior to 8.0.5."
}
],
"value": "Under certain conditions, an authenticated user request may execute with stale privileges following an intentional change by an authorized administrator. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.24, MongoDB Server v7.0 version prior to 7.0.21 and MongoDB Server v8.0 version prior to 8.0.5."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863: Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-26T14:04:46.283Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-93497"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Race condition in privilege cache invalidation cycle",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-6707",
"datePublished": "2025-06-26T14:04:46.283Z",
"dateReserved": "2025-06-26T11:09:08.157Z",
"dateUpdated": "2025-06-27T03:55:27.008Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6706 (GCVE-0-2025-6706)
Vulnerability from cvelistv5 – Published: 2025-06-26 14:00 – Updated: 2025-06-26 17:40
VLAI?
Title
Running certain aggregation operations with the SBE engine may lead to unexpected behavior on MongoDB Server
Summary
An authenticated user may trigger a use after free that may result in MongoDB Server crash and other unexpected behavior, even if the user does not have authorization to shut down a server.
The crash is triggered on affected versions by issuing an aggregation framework operation using a specific combination of rarely-used aggregation pipeline expressions. This issue affects MongoDB Server v6.0 version prior to 6.0.21, MongoDB Server v7.0 version prior to 7.0.17 and MongoDB Server v8.0 version prior to 8.0.4 when the SBE engine is enabled.
Severity ?
5 (Medium)
CWE
- CWE-416 - Use After Free
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
6.0 , < 6.0.21
(custom)
Affected: 7.0 , < 7.0.17 (custom) Affected: 8.0 , < 8.0.4 (custom) cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.21:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6706",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-26T17:40:36.944495Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-26T17:40:45.307Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "6.0.21",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.17",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.4",
"status": "affected",
"version": "8.0",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003e\u003cp\u003eSBE Engine must be enabled in order for this to occur.\u003c/p\u003e\u003c/div\u003e"
}
],
"value": "SBE Engine must be enabled in order for this to occur."
}
],
"datePublic": "2025-06-26T13:59:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An authenticated user may trigger a use after free that may result in MongoDB Server crash and other unexpected behavior, even if the user does not have authorization to shut down a server.\u003cbr\u003eThe crash is triggered on affected versions by issuing an aggregation framework operation using a specific combination of rarely-used aggregation pipeline expressions. This issue affects MongoDB Server v6.0 version prior to 6.0.21, MongoDB Server v7.0 version prior to 7.0.17 and MongoDB Server v8.0 version prior to 8.0.4 when the SBE engine is enabled."
}
],
"value": "An authenticated user may trigger a use after free that may result in MongoDB Server crash and other unexpected behavior, even if the user does not have authorization to shut down a server.\nThe crash is triggered on affected versions by issuing an aggregation framework operation using a specific combination of rarely-used aggregation pipeline expressions. This issue affects MongoDB Server v6.0 version prior to 6.0.21, MongoDB Server v7.0 version prior to 7.0.17 and MongoDB Server v8.0 version prior to 8.0.4 when the SBE engine is enabled."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416: Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-26T14:00:22.802Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-106746"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Running certain aggregation operations with the SBE engine may lead to unexpected behavior on MongoDB Server",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-6706",
"datePublished": "2025-06-26T14:00:22.802Z",
"dateReserved": "2025-06-26T10:53:59.446Z",
"dateUpdated": "2025-06-26T17:40:45.307Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-3085 (GCVE-0-2025-3085)
Vulnerability from cvelistv5 – Published: 2025-04-01 12:05 – Updated: 2025-04-01 13:03
VLAI?
Title
MongoDB Server running on Linux may allow unexpected connections where intermediate certificates are revoked
Summary
A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer's certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.
Required Configuration : MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled
Severity ?
8.1 (High)
CWE
- CWE-299 - Improper Check for Certificate Revocation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
5.0 , < 5.0.31
(custom)
Affected: 6.0 , < 6.0.20 (custom) Affected: 7.0 , < 7.0.16 (custom) Affected: 8.0. , < 8.0.4 (custom) cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-3085",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-01T13:02:43.439177Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-01T13:03:02.701Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "5.0.31",
"status": "affected",
"version": "5.0",
"versionType": "custom"
},
{
"lessThan": "6.0.20",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.16",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.4",
"status": "affected",
"version": "8.0.",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled"
}
],
"value": "MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled"
}
],
"datePublic": "2025-04-01T09:16:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer\u0027s certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.\u003cbr\u003eRequired Configuration :\u0026nbsp;MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled\u003c/p\u003e"
}
],
"value": "A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer\u0027s certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.\nRequired Configuration :\u00a0MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-299",
"description": "CWE-299: Improper Check for Certificate Revocation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-01T12:05:05.401Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-95445"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "MongoDB Server running on Linux may allow unexpected connections where intermediate certificates are revoked",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-3085",
"datePublished": "2025-04-01T12:05:05.401Z",
"dateReserved": "2025-04-01T09:16:34.872Z",
"dateUpdated": "2025-04-01T13:03:02.701Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-3084 (GCVE-0-2025-3084)
Vulnerability from cvelistv5 – Published: 2025-04-01 11:14 – Updated: 2025-04-01 13:10
VLAI?
Title
MongoDB Server may crash due to improper validation of explain command
Summary
When run on commands with certain arguments set, explain may fail to validate these arguments before using them. This can lead to crashes in router servers. This affects MongoDB Server v5.0 prior to 5.0.31, MongoDB Server v6.0 prior to 6.0.20, MongoDB Server v7.0 prior to 7.0.16 and MongoDB Server v8.0 prior to 8.0.4
Severity ?
6.5 (Medium)
CWE
- CWE-703 - Improper Check or Handling of Exceptional Conditions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
5.0 , < 5.0.31
(custom)
Affected: 6.0 , < 6.0.20 (custom) Affected: 7.0 , < 7.0.16 (custom) Affected: 8.0 , < 8.0.4 (custom) cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-3084",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-01T13:04:31.910410Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-01T13:10:04.793Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "5.0.31",
"status": "affected",
"version": "5.0",
"versionType": "custom"
},
{
"lessThan": "6.0.20",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.16",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "8.0.4",
"status": "affected",
"version": "8.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-04-01T09:08:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eWhen run on commands with certain arguments set, explain may fail to validate these arguments before using them. This can lead to crashes in router servers. This affects MongoDB Server v5.0 prior to 5.0.31, MongoDB Server v6.0 prior to 6.0.20, MongoDB Server v7.0 prior to 7.0.16 and MongoDB Server v8.0 prior to 8.0.4\u003c/p\u003e"
}
],
"value": "When run on commands with certain arguments set, explain may fail to validate these arguments before using them. This can lead to crashes in router servers. This affects MongoDB Server v5.0 prior to 5.0.31, MongoDB Server v6.0 prior to 6.0.20, MongoDB Server v7.0 prior to 7.0.16 and MongoDB Server v8.0 prior to 8.0.4"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-703",
"description": "CWE-703: Improper Check or Handling of Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-01T11:14:19.784Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-103153"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "MongoDB Server may crash due to improper validation of explain command",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-3084",
"datePublished": "2025-04-01T11:14:19.784Z",
"dateReserved": "2025-04-01T09:07:06.147Z",
"dateUpdated": "2025-04-01T13:10:04.793Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-3083 (GCVE-0-2025-3083)
Vulnerability from cvelistv5 – Published: 2025-04-01 11:12 – Updated: 2025-04-01 13:18
VLAI?
Title
Malformed MongoDB wire protocol messages may cause mongos to crash
Summary
Specifically crafted MongoDB wire protocol messages can cause mongos to crash during command validation. This can occur without using an authenticated connection. This issue affects MongoDB v5.0 versions prior to 5.0.31, MongoDB v6.0 versions prior to 6.0.20 and MongoDB v7.0 versions prior to 7.0.16
Severity ?
7.5 (High)
CWE
- CWE-248 - Uncaught Exception
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
5.0 , < 5.0.31
(custom)
Affected: 6.0 , < 6.0.20 (custom) Affected: 7.0. , < 7.0.16 (custom) cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-3083",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-01T13:11:21.374450Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-01T13:18:48.632Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "5.0.31",
"status": "affected",
"version": "5.0",
"versionType": "custom"
},
{
"lessThan": "6.0.20",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.16",
"status": "affected",
"version": "7.0.",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-04-01T11:10:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSpecifically crafted MongoDB wire protocol messages can cause mongos to crash during command validation. This can occur without using an authenticated connection. This issue affects MongoDB v5.0 versions prior to 5.0.31, \u0026nbsp;MongoDB v6.0 versions prior to\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e6.0.20 and MongoDB v7.0 versions prior to 7.0.16\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Specifically crafted MongoDB wire protocol messages can cause mongos to crash during command validation. This can occur without using an authenticated connection. This issue affects MongoDB v5.0 versions prior to 5.0.31, \u00a0MongoDB v6.0 versions prior to\u00a06.0.20 and MongoDB v7.0 versions prior to 7.0.16"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-248",
"description": "CWE-248: Uncaught Exception",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-01T11:12:31.268Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-103152"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Malformed MongoDB wire protocol messages may cause mongos to crash",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-3083",
"datePublished": "2025-04-01T11:12:31.268Z",
"dateReserved": "2025-04-01T08:58:57.864Z",
"dateUpdated": "2025-04-01T13:18:48.632Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-3082 (GCVE-0-2025-3082)
Vulnerability from cvelistv5 – Published: 2025-04-01 11:08 – Updated: 2025-04-01 15:14
VLAI?
Title
User may override a view's collation and gain unauthorized access to underlying data
Summary
A user authorized to access a view may be able to alter the intended collation, allowing them to access to a different or unintended view of underlying data. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.20, MongoDB Server v7.0 version prior to 7.0.14 and MongoDB Server v7.3 versions prior to 7.3.4.
Severity ?
CWE
- CWE-284 - Improper Access Control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MongoDB Inc | MongoDB Server |
Affected:
5.0 , < 5.0.31
(custom)
Affected: 6.0 , < 6.0.20 (custom) Affected: 7.0 , < 7.0.14 (custom) Affected: 7.3 , < 7.3.4 (custom) cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.3.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.3.3:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-3082",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-01T15:14:28.533719Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-01T15:14:39.348Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.3.3:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "5.0.31",
"status": "affected",
"version": "5.0",
"versionType": "custom"
},
{
"lessThan": "6.0.20",
"status": "affected",
"version": "6.0",
"versionType": "custom"
},
{
"lessThan": "7.0.14",
"status": "affected",
"version": "7.0",
"versionType": "custom"
},
{
"lessThan": "7.3.4",
"status": "affected",
"version": "7.3",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-04-01T08:47:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA user authorized to access a view may be able to alter the intended collation, allowing them to access to a different or unintended view of underlying data. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.20, MongoDB Server v7.0 version prior to 7.0.14 and MongoDB Server v7.3 versions prior to 7.3.4.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "A user authorized to access a view may be able to alter the intended collation, allowing them to access to a different or unintended view of underlying data. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.20, MongoDB Server v7.0 version prior to 7.0.14 and MongoDB Server v7.3 versions prior to 7.3.4."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284: Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-01T11:08:06.589Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-103151"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "User may override a view\u0027s collation and gain unauthorized access to underlying data",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-3082",
"datePublished": "2025-04-01T11:08:06.589Z",
"dateReserved": "2025-04-01T08:47:40.658Z",
"dateUpdated": "2025-04-01T15:14:39.348Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-0755 (GCVE-0-2025-0755)
Vulnerability from cvelistv5 – Published: 2025-03-18 09:01 – Updated: 2025-11-03 19:35
VLAI?
Title
MongoDB C Driver bson library may be susceptible to buffer overflow
Summary
The various bson_append functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16
Severity ?
8.4 (High)
CWE
- CWE-122 - Heap-based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| MongoDB Inc | libbson |
Affected:
0 , < 1.27.5
(custom)
cpe:2.3:a:mongodb:libbson:0.2.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.2.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.2.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.4.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.5.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.6.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.8.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.8.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.8.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:0.98.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.1.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.0:beta1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.2.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.0:beta0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.3.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.0:beta0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.0:beta1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.4.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc3:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc4:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.0:rc6:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.5.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.6.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.7.0:rc2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.8.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.0:-:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.0:rc1:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.9.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.10.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.11.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.12.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.13.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.13.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.14.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.14.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.15.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.16.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.16.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.16.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:beta:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:beta2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:rc0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.17.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.18.0:alpha:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.18.0:alpha2:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.18.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.19.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.19.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.19.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.20.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.20.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.21.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.21.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.21.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.0:beta0:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.22.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.23.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.24.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.25.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.26.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.26.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.26.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:libbson:1.27.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:* |
|||||||
|
|||||||||
Credits
selmelc
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-0755",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-18T13:20:06.283556Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T13:20:24.560Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T19:35:09.738Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00027.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:mongodb:libbson:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:0.98.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.17.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.18.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.18.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.23.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.24.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.25.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.26.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.26.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.26.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:libbson:1.27.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "libbson",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "1.27.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MongoDB Server",
"vendor": "MongoDB Inc",
"versions": [
{
"lessThan": "8.0.1",
"status": "affected",
"version": "8.0",
"versionType": "custom"
},
{
"lessThan": "7.0.16",
"status": "affected",
"version": "7.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "selmelc"
}
],
"datePublic": "2025-03-18T09:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThe various \u003ctt\u003ebson_append\u003c/tt\u003e\u0026nbsp;functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16\u003c/p\u003e"
}
],
"value": "The various bson_append\u00a0functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122: Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-24T08:42:52.079Z",
"orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"shortName": "mongodb"
},
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-94461"
},
{
"url": "https://jira.mongodb.org/browse/CDRIVER-5601"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "MongoDB C Driver bson library may be susceptible to buffer overflow",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
"assignerShortName": "mongodb",
"cveId": "CVE-2025-0755",
"datePublished": "2025-03-18T09:01:04.793Z",
"dateReserved": "2025-01-27T16:13:12.042Z",
"dateUpdated": "2025-11-03T19:35:09.738Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}