MongoDB Server v7-8.2 DoS via MD5 on Malformed BSON
CVE-2026-6914 Published on April 29, 2026
MD5 checksum creation may cause availability loss
Computing the MD5 checksum of a malformed BSON object under specific conditions may cause loss of availability in MongoDB server.
This issue affects all MongoDB Server v8.2 versions, all MongoDB Server v8.1 versions, MongoDB Server v8.0 versions prior to 8.0.21, MongoDB Server v7.0 versions prior to 7.0.32
Vulnerability Analysis
CVE-2026-6914 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
What is an Integer underflow Vulnerability?
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. This can happen in signed and unsigned cases.
CVE-2026-6914 has been classified to as an Integer underflow vulnerability or weakness.
Products Associated with CVE-2026-6914
Want to know whenever a new CVE is published for MongoDB? stack.watch will email you.
Affected Versions
MongoDB Server:- Version 8.2.0 and below 8.2.7 is affected.
- Version 8.1.0, <= 8.1.* is affected.
- Version 8.0.0 and below 8.0.21 is affected.
- Version 7.0.0 and below 7.0.32 is affected.