Vulnerability from cleanstart
Published
2026-04-16 00:55
Modified
2026-04-15 07:43
Summary
Axios is a promise based HTTP client for the browser and Node
Details

Multiple security vulnerabilities affect the mongosh package. Axios is a promise based HTTP client for the browser and Node. See references for individual vulnerability details.

References
https://github.com/cleanstart-dev/cleanstart-secu… ADVISORY
https://osv.dev/vulnerability/CVE-2025-25285 WEB
https://osv.dev/vulnerability/CVE-2025-62718 WEB
https://osv.dev/vulnerability/CVE-2026-21637 WEB
https://osv.dev/vulnerability/CVE-2026-2950 WEB
https://osv.dev/vulnerability/CVE-2026-33750 WEB
https://osv.dev/vulnerability/CVE-2026-33916 WEB
https://osv.dev/vulnerability/CVE-2026-33937 WEB
https://osv.dev/vulnerability/CVE-2026-4800 WEB
https://osv.dev/vulnerability/CVE-2026-4923 WEB
https://osv.dev/vulnerability/CVE-2026-4926 WEB
https://osv.dev/vulnerability/ghsa-23c5-xmqv-rm74 WEB
https://osv.dev/vulnerability/ghsa-2qvq-rjwj-gvw9 WEB
https://osv.dev/vulnerability/ghsa-2w6w-674q-4c4q WEB
https://osv.dev/vulnerability/ghsa-3mfm-83xf-c92r WEB
https://osv.dev/vulnerability/ghsa-3p68-rc4w-qgx5 WEB
https://osv.dev/vulnerability/ghsa-3ppc-4f35-3m26 WEB
https://osv.dev/vulnerability/ghsa-3v7f-55p6-f55p WEB
https://osv.dev/vulnerability/ghsa-442j-39wm-28r2 WEB
https://osv.dev/vulnerability/ghsa-48c2-rrv3-qjmp WEB
https://osv.dev/vulnerability/ghsa-72xf-g2v4-qvf3 WEB
https://osv.dev/vulnerability/ghsa-7r86-cg39-jmmj WEB
https://osv.dev/vulnerability/ghsa-7rx3-28cr-v5wh WEB
https://osv.dev/vulnerability/ghsa-9cx6-37pm-9jff WEB
https://osv.dev/vulnerability/ghsa-c2c7-rcm5-vvqj WEB
https://osv.dev/vulnerability/ghsa-chqc-8p9q-pq6q WEB
https://osv.dev/vulnerability/ghsa-f23m-r3pf-42rh WEB
https://osv.dev/vulnerability/ghsa-f886-m6hf-6m8v WEB
https://osv.dev/vulnerability/ghsa-j3q9-mxjg-w52f WEB
https://osv.dev/vulnerability/ghsa-pfrx-2q88-qq97 WEB
https://osv.dev/vulnerability/ghsa-r5fr-rjxr-66jc WEB
https://osv.dev/vulnerability/ghsa-rc47-6667-2j5j WEB
https://osv.dev/vulnerability/ghsa-rmvr-2pp2-xj38 WEB
https://osv.dev/vulnerability/ghsa-xhpv-hc6g-r9c6 WEB
https://osv.dev/vulnerability/ghsa-xjpj-3mr7-gcpf WEB
https://nvd.nist.gov/vuln/detail/CVE-2025-25285 WEB
https://nvd.nist.gov/vuln/detail/CVE-2025-62718 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-21637 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-2950 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-33750 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-33916 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-33937 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-4800 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-4923 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-4926 WEB

{
  "affected": [
    {
      "package": {
        "ecosystem": "CleanStart",
        "name": "mongosh"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2.6.0-r3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "credits": [],
  "database_specific": {},
  "details": "Multiple security vulnerabilities affect the mongosh package. Axios is a promise based HTTP client for the browser and Node. See references for individual vulnerability details.",
  "id": "CLEANSTART-2026-KS09647",
  "modified": "2026-04-15T07:43:47Z",
  "published": "2026-04-16T00:55:51.498867Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-KS09647.json"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2025-25285"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2025-62718"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-21637"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-2950"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-33750"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-33916"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-33937"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-4800"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-4923"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-4926"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-23c5-xmqv-rm74"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-2qvq-rjwj-gvw9"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-2w6w-674q-4c4q"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-3mfm-83xf-c92r"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-3p68-rc4w-qgx5"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-3ppc-4f35-3m26"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-3v7f-55p6-f55p"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-442j-39wm-28r2"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-48c2-rrv3-qjmp"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-72xf-g2v4-qvf3"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-7r86-cg39-jmmj"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-7rx3-28cr-v5wh"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-9cx6-37pm-9jff"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-c2c7-rcm5-vvqj"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-chqc-8p9q-pq6q"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-f23m-r3pf-42rh"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-f886-m6hf-6m8v"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-j3q9-mxjg-w52f"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-pfrx-2q88-qq97"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-r5fr-rjxr-66jc"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-rc47-6667-2j5j"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-rmvr-2pp2-xj38"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-xhpv-hc6g-r9c6"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-xjpj-3mr7-gcpf"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25285"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62718"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2950"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33750"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33916"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33937"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4923"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926"
    }
  ],
  "related": [],
  "schema_version": "1.7.3",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ],
  "summary": "Axios is a promise based HTTP client for the browser and Node",
  "upstream": [
    "CVE-2025-25285",
    "CVE-2025-62718",
    "CVE-2026-21637",
    "CVE-2026-2950",
    "CVE-2026-33750",
    "CVE-2026-33916",
    "CVE-2026-33937",
    "CVE-2026-4800",
    "CVE-2026-4923",
    "CVE-2026-4926",
    "ghsa-23c5-xmqv-rm74",
    "ghsa-2qvq-rjwj-gvw9",
    "ghsa-2w6w-674q-4c4q",
    "ghsa-3mfm-83xf-c92r",
    "ghsa-3p68-rc4w-qgx5",
    "ghsa-3ppc-4f35-3m26",
    "ghsa-3v7f-55p6-f55p",
    "ghsa-442j-39wm-28r2",
    "ghsa-48c2-rrv3-qjmp",
    "ghsa-72xf-g2v4-qvf3",
    "ghsa-7r86-cg39-jmmj",
    "ghsa-7rx3-28cr-v5wh",
    "ghsa-9cx6-37pm-9jff",
    "ghsa-c2c7-rcm5-vvqj",
    "ghsa-chqc-8p9q-pq6q",
    "ghsa-f23m-r3pf-42rh",
    "ghsa-f886-m6hf-6m8v",
    "ghsa-j3q9-mxjg-w52f",
    "ghsa-pfrx-2q88-qq97",
    "ghsa-r5fr-rjxr-66jc",
    "ghsa-rc47-6667-2j5j",
    "ghsa-rmvr-2pp2-xj38",
    "ghsa-xhpv-hc6g-r9c6",
    "ghsa-xjpj-3mr7-gcpf"
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…