MongoDB NoSQL Database
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any MongoDB product.
RSS Feeds for MongoDB security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in MongoDB products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by MongoDB Sorted by Most Security Vulnerabilities since 2018
Known Exploited MongoDB Vulnerabilities
The following MongoDB vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| MongoDB and MongoDB Server Improper Handling of Length Parameter Inconsistency Vulnerability |
MongoDB Server contains an improper handling of length parameter inconsistency vulnerability in Zlib compressed protocol headers. This vulnerability may allow a read of uninitialized heap memory by an unauthenticated client. CVE-2025-14847 Exploit Probability: 67.2% |
December 29, 2025 |
| MongoDB mongo-express Remote Code Execution Vulnerability |
mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. CVE-2019-10758 Exploit Probability: 94.1% |
December 10, 2021 |
The vulnerability CVE-2019-10758: MongoDB mongo-express Remote Code Execution Vulnerability is in the top 1% of the currently known exploitable vulnerabilities. The vulnerability CVE-2025-14847: MongoDB and MongoDB Server Improper Handling of Length Parameter Inconsistency Vulnerability is in the top 5% of the currently known exploitable vulnerabilities.
By the Year
In 2026 there have been 0 vulnerabilities in MongoDB. Last year, in 2025 MongoDB had 23 security vulnerabilities published. Right now, MongoDB is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 23 | 6.45 |
| 2024 | 17 | 6.72 |
| 2023 | 6 | 7.03 |
| 2022 | 4 | 6.65 |
| 2021 | 13 | 5.90 |
| 2020 | 20 | 6.54 |
| 2019 | 2 | 5.65 |
| 2018 | 2 | 7.80 |
It may take a day or so for new MongoDB vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent MongoDB Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-14847 | Dec 19, 2025 |
MongoDB Server Uninit Heap Read via Zlib Header Len Mismatch <4.2.0Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0. |
|
| CVE-2025-14345 | Dec 09, 2025 |
MongoDB Server 7.0/8.0/8.2 Before x.x: Post-Auth Tx Commit FlawA post-authentication flaw in the network two-phase commit protocol used for cross-shard transactions in MongoDB Server may lead to logical data inconsistencies under specific conditions which are not predictable and exist for a very short period of time. This error can cause the transaction coordination logic to misinterpret the transaction as committed, resulting in inconsistent state on those shards. This may lead to low integrity and availability impact. This issue impacts MongoDB Server v8.0 versions prior to 8.0.16, MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB server v8.2 versions prior to 8.2.2. |
|
| CVE-2025-13644 | Nov 25, 2025 |
MongoDB invariant failure in batched delete (v7.0<26, v8.0<13, v8.1<2)MongoDB Server may experience an invariant failure during batched delete operations when handling documents. The issue arises when the server mistakenly assumes the presence of multiple documents in a batch based solely on document size exceeding BSONObjMaxSize. This issue affects MongoDB Server v7.0 versions prior to 7.0.26, MongoDB Server v8.0 versions prior to 8.0.13, and MongoDB Server v8.1 versions prior to 8.1.2 |
|
| CVE-2025-13643 | Nov 25, 2025 |
MongoDB Denial-of-Service via Query Termination Privileges before 7.0.26/8.0.14A user with access to the cluster with a limited set of privilege actions may be able to terminate queries that are being executed by other users. This may cause a denial of service by preventing a fraction of queries from successfully completing. This issue affects MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB Server v8.0 versions prior to 8.0.14 |
|
| CVE-2025-12893 | Nov 25, 2025 |
TLS EKU Bypass CVE-2025-12893: MongoDB Server v7.0/8.0/8.2 Pre-FixClients may successfully perform a TLS handshake with a MongoDB server despite presenting a client certificate not aligning with the documented Extended Key Usage (EKU) requirements. A certificate that specifies extendedKeyUsage but is missing extendedKeyUsage = clientAuth may still be successfully authenticated via the TLS handshake as a client. This issue is specific to MongoDB servers running on Windows or Apple as the expected validation behavior functions correctly on Linux systems. Additionally, MongoDB servers may successfully establish egress TLS connections with servers that present server certificates not aligning with the documented Extended Key Usage (EKU) requirements. A certificate that specifies extendedKeyUsage but is missing extendedKeyUsage = serverAuth may still be successfully authenticated via the TLS handshake as a server. This issue is specific to MongoDB servers running on Apple as the expected validation behavior functions correctly on both Linux and Windows systems. This vulnerability affects MongoDB Server v7.0 versions prior to 7.0.26, MongoDB Server v8.0 versions prior to 8.0.16 and MongoDB Server v8.2 versions prior to 8.2.2 |
|
| CVE-2025-13507 | Nov 25, 2025 |
MongoDB Server <=7.0.26/8.0.16/8.2.1: Timeseries Oversized BSON CrashInconsistent object size validation in time series processing logic may result in later processing of oversized BSON documents leading to an assert failing and process termination. This issue impacts MongoDB Server v7.0 versions prior to 7.0.26, v8.0 versions prior to 8.0.16 and MongoDB server v8.2 versions prior to 8.2.1. |
|
| CVE-2025-12119 | Nov 18, 2025 |
Memory Disclosure via Large Options in MongoDB C Driver (mongoc_bulk_operation_t)A mongoc_bulk_operation_t may read invalid memory if large options are passed. |
|
| CVE-2025-12657 | Nov 03, 2025 |
MongoDB KMIP Parser Tolerant to Malformed Packets Causing Read Access ViolationThe KMIP response parser built into mongo binaries is overly tolerant of certain malformed packets, and may parse them into invalid objects. Later reads of this object can result in read access violations. |
|
| CVE-2025-12100 | Oct 23, 2025 |
MongoDB BI Connector ODBC Driver Default-Perm Priv Escalation v1.0.01.4.6Incorrect Default Permissions vulnerability in MongoDB BI Connector ODBC driver allows Privilege Escalation.This issue affects BI Connector ODBC driver: from 1.0.0 through 1.4.6. |
|
| CVE-2025-11575 | Oct 23, 2025 |
Privilege Escalation in MongoDB Atlas SQL ODBC Driver 1.0.0-2.0.0 (Win)Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0. |
|
| CVE-2025-11979 | Oct 20, 2025 |
MongoDB Server v7.0 Xbefore 7.0.25: Buffer Overread Crash by Authorized UserAn authorized user may crash the MongoDB server by causing buffer over-read. This can be done by issuing a DDL operation while queries are being issued, under some conditions. This issue affects MongoDB Server v7.0 versions prior to 7.0.25, MongoDB Server v8.0 versions prior to 8.0.15, and MongoDB Server version 8.2.0. |
|
| CVE-2025-11695 | Oct 13, 2025 |
MongoDB Rust Driver <3.2.5: tlsInsecure=False disables cert validationWhen tlsInsecure=False appears in a connection string, certificate validation is disabled. This vulnerability affects MongoDB Rust Driver versions prior to v3.2.5 |
|
| CVE-2025-11535 | Oct 08, 2025 |
MongoDB Connector for BI MSI ACL Misconfig PrivEsc (2.0.0-2.14.24)MongoDB Connector for BI installation via MSI on Windows leaves ACLs unset on custom install directories allows Privilege Escalation.This issue affects MongoDB Connector for BI: from 2.0.0 through 2.14.24. |
|
| CVE-2025-10491 | Sep 15, 2025 |
DLL Hijack via ACL Misconfig in MongoDB <6.0.25 / <7.0.21 / <8.0.5 (Windows MSI)The MongoDB Windows installation MSI may leave ACLs unset on custom installation directories allowing a local attacker to introduce executable code to MongoDB's process via DLL hijacking. This issue affects MongoDB Server v6.0 version prior to 6.0.25, MongoDB Server v7.0 version prior to 7.0.21 and MongoDB Server v8.0 version prior to 8.0.5 |
|
| CVE-2025-7259 | Jul 07, 2025 |
MongoDB 8.1 Duplicate _id Queries Causing Crash (DOS)An authorized user can issue queries with duplicate _id fields, that leads to unexpected behavior in MongoDB Server, which may result to crash. This issue can only be triggered by authorized users and cause Denial of Service. This issue affects MongoDB Server v8.1 version 8.1.0. |
|
| CVE-2025-6713 | Jul 07, 2025 |
MongoDB $mergeCursors RCE: Access without auth in 6.0-8.0 < 6.0.22/7.0.19/8.0.7An unauthorized user may leverage a specially crafted aggregation pipeline to access data without proper authorization due to improper handling of the $mergeCursors stage in MongoDB Server. This may lead to access to data without further authorisation. This issue affects MongoDB Server MongoDB Server v8.0 versions prior to 8.0.7, MongoDB Server v7.0 versions prior to 7.0.19 and MongoDB Server v6.0 versions prior to 6.0.22 |
|
| CVE-2025-6706 | Jun 26, 2025 |
MongoDB SBE UAF (v6.0<6.0.21, v7.0<7.0.17, v8.0<8.0.4)An authenticated user may trigger a use after free that may result in MongoDB Server crash and other unexpected behavior, even if the user does not have authorization to shut down a server. The crash is triggered on affected versions by issuing an aggregation framework operation using a specific combination of rarely-used aggregation pipeline expressions. This issue affects MongoDB Server v6.0 version prior to 6.0.21, MongoDB Server v7.0 version prior to 7.0.17 and MongoDB Server v8.0 version prior to 8.0.4 when the SBE engine is enabled. |
|
| CVE-2025-6709 | Jun 26, 2025 |
MongoDB Server DoS via Malformed Date in OIDC JSON (v6.0 <6.0.21, v7.0 <7.0.17, v8.0 <8.0.5)The MongoDB Server is susceptible to a denial of service vulnerability due to improper handling of specific date values in JSON input when using OIDC authentication. This can be reproduced using the mongo shell to send a malicious JSON payload leading to an invariant failure and server crash. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5. The same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating. |
|
| CVE-2025-6710 | Jun 26, 2025 |
MongoDB Server <7.0.17 & <8.0.5 Recursion JSON Parsing Stack OverflowMongoDB Server may be susceptible to stack overflow due to JSON parsing mechanism, where specifically crafted JSON inputs may induce unwarranted levels of recursion, resulting in excessive stack space consumption. Such inputs can lead to a stack overflow that causes the server to crash which could occur pre-authorisation. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5. The same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating. |
|
| CVE-2025-3083 | Apr 01, 2025 |
MongoDB mongos Crash via Malicious Wire Msgs Before 5.0.31/6.0.20/7.0.16Specifically crafted MongoDB wire protocol messages can cause mongos to crash during command validation. This can occur without using an authenticated connection. This issue affects MongoDB v5.0 versions prior to 5.0.31, MongoDB v6.0 versions prior to 6.0.20 and MongoDB v7.0 versions prior to 7.0.16 |
|
| CVE-2025-3082 | Apr 01, 2025 |
MongoDB Collation Pwn via Unauth View Access (5.x<5.0.31,6.x<6.0.20,7.x<7.0.14)A user authorized to access a view may be able to alter the intended collation, allowing them to access to a different or unintended view of underlying data. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.20, MongoDB Server v7.0 version prior to 7.0.14 and MongoDB Server v7.3 versions prior to 7.3.4. |
|
| CVE-2025-0755 | Mar 18, 2025 |
MongoDB C Driver <1.27.5: Buffer Overflow via bson_appendThe various bson_append functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16 |
|
| CVE-2025-1756 | Feb 27, 2025 |
mongosh <2.3.0: LPE via crafted file in C:\node_modulesmongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privilege, when a crafted file is stored in C:\node_modules\. This issue affects mongosh prior to 2.3.0 |
|
| CVE-2024-10921 | Nov 14, 2024 |
MongoDB Server: BSON Parsing Vulnerability Leading to Buffer Over-ReadAn authorized user may trigger crashes or receive the contents of buffer over-reads of Server memory by issuing specially crafted requests that construct malformed BSON in the MongoDB Server. This issue affects MongoDB Server v5.0 versions prior to 5.0.30 , MongoDB Server v6.0 versions prior to 6.0.19, MongoDB Server v7.0 versions prior to 7.0.15 and MongoDB Server v8.0 versions prior to and including 8.0.2. |
|
| CVE-2024-8013 | Oct 28, 2024 |
MongoDB Encrypted via mongocryptd $lookup Bug v5.0-5.0.28,6.0-6.0.16,7.0-7.0.11A bug in query analysis of certain complex self-referential $lookup subpipelines may result in literal values in expressions for encrypted fields to be sent to the server as plaintext instead of ciphertext. Should this occur, no documents would be returned or written. This issue affects mongocryptd binary (v5.0 versions prior to 5.0.29, v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) and mongo_crypt_v1.so shared libraries (v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) released alongside MongoDB Enterprise Server versions. |
|
| CVE-2024-8305 | Oct 21, 2024 |
MongoDB Server v6/v7 Index Constraint Bug Causes Secondary CrashesprepareUnique index may cause secondaries to crash due to incorrect enforcement of index constraints on secondaries, where in extreme cases may cause multiple secondaries crashing leading to no primaries. This issue affects MongoDB Server v6.0 versions prior to 6.0.17, MongoDB Server v7.0 versions prior to 7.0.13 and MongoDB Server v7.3 versions prior to 7.3.4 |
|
| CVE-2024-8654 | Sep 10, 2024 |
MongoDB Server 6.0.3: Agg Stage Null Mem Access (Zero-Arg)MongoDB Server may access non-initialized region of memory leading to unexpected behaviour when zero arguments are called in internal aggregation stage. This issue affected MongoDB Server v6.0 version 6.0.3. |
|
| CVE-2024-8207 | Aug 27, 2024 |
MongoDB Server v5.0/6.0: Unix Shared Library Hijack (5.0.13/6.0.2)In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3. Required Configuration: Only environments with Linux as the underlying operating system is affected by this issue |
|
| CVE-2024-6384 | Aug 13, 2024 |
MongoDB Enterprise <6.0.16 Hot Backup Download by Undepri Users"Hot" backup files may be downloaded by underprivileged users, if they are capable of acquiring a unique backup identifier. This issue affects MongoDB Enterprise Server v6.0 versions prior to 6.0.16, MongoDB Enterprise Server v7.0 versions prior to 7.0.11 and MongoDB Enterprise Server v7.3 versions prior to 7.3.3 |
|
| CVE-2024-7553 | Aug 07, 2024 |
MongoDB Server LPE: Untrusted File Validation on Windows (before 7.3.3)Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1. Required Configuration: Only environments with Windows as the underlying operating system is affected by this issue |
|
| CVE-2024-6383 | Jul 03, 2024 |
MongoDB C Driver libbson buffer overflow vuln (pre1.27.1)The bson_string_append function in MongoDB C Driver may be vulnerable to a buffer overflow where the function might attempt to allocate too small of buffer and may lead to memory corruption of neighbouring heap memory. This issue affects libbson versions prior to 1.27.1 |
|
| CVE-2024-6381 | Jul 02, 2024 |
Integer Overflow in libbson <1.26.2 causing memory corruptionThe bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2 |
|
| CVE-2024-6375 | Jul 01, 2024 |
MongoDB Server Shard Key Refine Cmd Auth Bypass (5.0-5.0.21, 6.0-6.0.10, 7.0-7.0.2)A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3. |
|
| CVE-2024-6376 | Jul 01, 2024 |
MongoDB Compass Code Injection via EJSON Shell Parser Before 1.42.2MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2 |
|
| CVE-2024-5629 | Jun 05, 2024 |
PyMongo 4.6.2 BSON Module OOB Read VulnerabilityAn out-of-bounds read in the 'bson' module of PyMongo 4.6.2 or earlier allows deserialization of malformed BSON provided by a Server to raise an exception which may contain arbitrary application memory. |
|
| CVE-2024-3372 | May 14, 2024 |
MongoDB Server BSON Meta Validation Flaw v5.0-<5.0.25, 6.0-<6.0.14, 7.0-<7.0.6Improper validation of certain metadata input may result in the server not correctly serialising BSON. This can be performed pre-authentication and may cause unexpected application behavior including unavailability of serverStatus responses. This issue affects MongoDB Server v7.0 versions prior to 7.0.6, MongoDB Server v6.0 versions prior to 6.0.14 and MongoDB Server v.5.0 versions prior to 5.0.25. |
|
| CVE-2024-3374 | May 14, 2024 |
MongoDB Server <5.0.16/6.0.5 - Unauth Fatal Assertion in ftdc MetricsAn unauthenticated user can trigger a fatal assertion in the server while generating ftdc diagnostic metrics due to attempting to build a BSON object that exceeds certain memory sizes. This issue affects MongoDB Server v5.0 versions prior to and including 5.0.16 and MongoDB Server v6.0 versions prior to and including 6.0.5. |
|
| CVE-2024-3371 | Apr 24, 2024 |
MongoDB Compass 1.42.0 Unvalidated Input Data DisclosureMongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0. |
|
| CVE-2024-1351 | Mar 07, 2024 |
MongoDB Server v4.4-7.0 TLS CAFile Validation Skip - Untrusted ConnectionsUnder certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28. Required Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured. |
|
| CVE-2023-0437 | Jan 12, 2024 |
MongoDB C Driver <1.25.0 Infinite Loop in bson_utf8_validateWhen calling bson_utf8_validate on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0. |
|
| CVE-2023-0436 | Nov 07, 2023 |
MongoDB Atlas K8s Operator DEBUG Log Info Leak (v1.51.7)The affected versions of MongoDB Atlas Kubernetes Operator may print sensitive information like GCP service account keys and API integration secrets while DEBUG mode logging is enabled. This issue affects MongoDB Atlas Kubernetes Operator versions: 1.5.0, 1.6.0, 1.6.1, 1.7.0. Please note that this is reported on an EOL version of the product, and users are advised to upgrade to the latest supported version. Required Configuration: DEBUG logging is not enabled by default, and must be configured by the end-user. To check the log-level of the Operator, review the flags passed in your deployment configuration (eg. https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27 https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27 ) |
|
| CVE-2021-32050 | Aug 29, 2023 |
MongoDB Driver before 5.8.0 Command Listener Logs Sensitive Auth DataSome MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed. Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default). This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0). |
And others... |
| CVE-2023-1409 | Aug 23, 2023 |
MongoDB TLS Client Cert Validation Bypass v4.46.3If the MongoDB Server running on Windows or macOS is configured to use TLS with a specific set of configuration options that are already known to work securely in other platforms (e.g. Linux), it is possible that client certificate validation may not be in effect, potentially allowing client to establish a TLS connection with the server that supplies any certificate. This issue affect all MongoDB Server v6.3 versions, MongoDB Server v5.0 versions v5.0.0 to v5.0.14 and all MongoDB Server v4.4 versions. |
|
| CVE-2023-4009 | Aug 08, 2023 |
MongoDB Ops Manager v5.0/6.0 API Key Escalation (v5.0.22/6.0.17)In MongoDB Ops Manager v5.0 prior to 5.0.22 and v6.0 prior to 6.0.17 it is possible for an authenticated user with project owner or project user admin access to generate an API key with the privileges of org owner resulting in privilege escalation. |
|
| CVE-2023-0342 | Jun 09, 2023 |
MongoDB OpsMgr PEM Key Password Not Redacted in Diagnostics ArchivesMongoDB Ops Manager Diagnostics Archive may not redact sensitive PEM key file password app settings. Archives do not include the PEM files themselves. This issue affects MongoDB Ops Manager v5.0 prior to 5.0.21 and MongoDB Ops Manager v6.0 prior to 6.0.12 |
|
| CVE-2022-48282 | Feb 21, 2023 |
Privilege Escalation in MongoDB .NET/C# Driver <=2.18.0 via _t DiscriminatorUnder very specific circumstances (see Required configuration section below), a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0 Following configuration must be true for the vulnerability to be applicable: * Application must written in C# taking arbitrary data from users and serializing data using _t without any validation AND * Application must be running on a Windows host using the full .NET Framework, not .NET Core AND * Application must have domain model class with a property/field explicitly of type System.Object or a collection of type System.Object (against MongoDB best practice) AND * Malicious attacker must have unrestricted insert access to target database to add a _t discriminator."Following configuration must be true for the vulnerability to be applicable |
|
| CVE-2022-24272 | Apr 21, 2022 |
An authenticated user may trigger an invariant assertion during command dispatch due to incorrect validation on the $external databaseAn authenticated user may trigger an invariant assertion during command dispatch due to incorrect validation on the $external database. This may result in mongod denial of service or server crash. This issue affects: MongoDB Inc. MongoDB Server v5.0 versions, prior to and including v5.0.6. |
|
| CVE-2021-32040 | Apr 12, 2022 |
It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operatorIt may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and MongoDB Server v4.2 versions prior to 4.2.16. Workaround: >= v4.2.16 users and all v4.4 users can add the --setParameter internalPipelineLengthLimit=50 instead of the default 1000 to mongod at startup to prevent a crash. |
|
| CVE-2021-32036 | Feb 04, 2022 |
An authenticated user without any specific authorizations may be able to repeatedly invoke the features command where at a high volume may lead to resource depletion or generate high lock contentionAn authenticated user without any specific authorizations may be able to repeatedly invoke the features command where at a high volume may lead to resource depletion or generate high lock contention. This may result in denial of service and in rare cases could result in id field collisions. This issue affects MongoDB Server v5.0 versions prior to and including 5.0.3; MongoDB Server v4.4 versions prior to and including 4.4.9; MongoDB Server v4.2 versions prior to and including 4.2.16 and MongoDB Server v4.0 versions prior to and including 4.0.28 |
|
| CVE-2021-32039 | Jan 20, 2022 |
Users with appropriate file access may be able to access unencrypted user credentials saved by MongoDB Extension for VS Code in a binary fileUsers with appropriate file access may be able to access unencrypted user credentials saved by MongoDB Extension for VS Code in a binary file. These credentials may be used by malicious attackers to perform unauthorized actions. This vulnerability affects all MongoDB Extension for VS Code including and prior to version 0.7.0 |
|