<?xml version="1.0" encoding="UTF-8" ?>
      <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
      <channel>
      <title>MongoDB | Alerts</title>
      <description>MongoDB news and information.</description>
      <link>https://www.mongodb.com/resources/products/mongodb-security-bulletins</link>
  
    <item>
      <title>MongoDB C# Driver may publish events containing authentication-related data to a command listener configured by an application (CVE-2021-20331)</title>
      <description><![CDATA[<p>Specific versions of the MongoDB C# Driver may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when commands such as &quot;saslStart&quot;, &quot;saslContinue&quot;, &quot;isMaster&quot;, &quot;createUser&quot;, and &quot;updateUser&quot; are executed. Without due care, an application may inadvertently expose this authenticated-related information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default). This issue affects the MongoDB C# Driver 2.12 &lt;= 2.12.1.</p>
 <br> CVSS Score has been rated as 4.2]]></description>
      <pubDate>Mon, 24 May 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/CSHARP-3521</link>
      <guid>https://jira.mongodb.org/browse/CSHARP-3521#1</guid>
    </item>
    <item>
      <title>Specific cstrings input may not be properly validated in the Go Driver (CVE-2021-20329)</title>
      <description><![CDATA[<p>Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshalling Go objects into BSON. A malicious user could use a Go object with specific string to potentially inject additional fields into marshalled documents. This issue affects all MongoDB GO Drivers up to (and including) 1.5.0.</p>
 <br> CVSS Score has been rated as 6.8]]></description>
      <pubDate>Thu, 10 Jun 2021 00:00:00 GMT</pubDate>
      <link>https://github.com/mongodb/mongo-go-driver/releases/tag/v1.5.1</link>
      <guid>https://github.com/mongodb/mongo-go-driver/releases/tag/v1.5.1#1</guid>
    </item>
    <item>
      <title>Server log entry spoofing via newline injection (CVE-2021-20333)</title>
      <description><![CDATA[<p>Sending specially crafted commands to a MongoDB Server may result in artificial log entries being generated or for log entries to be split. This issue affects MongoDB Server v3.6 versions prior to 3.6.20; MongoDB Server v4.0 versions prior to 4.0.21; MongoDB Server v4.2 versions prior to 4.2.10;</p>
 <br> CVSS Score has been rated as 5.3]]></description>
      <pubDate>Fri, 23 Jul 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-50605</link>
      <guid>https://jira.mongodb.org/browse/SERVER-50605#1</guid>
    </item>
    <item>
      <title>MongoDB Rust Driver may publish events containing authentication-related data to a connection pool event listener configured by an application (CVE-2021-20332)</title>
      <description><![CDATA[<p>Specific MongoDB Rust Driver versions can include credentials used by the connection pool to authenticate connections in the monitoring event that is emitted when the pool is created. The user&#39;s logging infrastructure could then potentially ingest these events and unexpectedly leak the credentials. Note that such monitoring is not enabled by default.</p>
 <br> CVSS Score has been rated as 4.2]]></description>
      <pubDate>Mon, 02 Aug 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/RUST-591</link>
      <guid>https://jira.mongodb.org/browse/RUST-591#1</guid>
    </item>
    <item>
      <title>User may trigger invariant when allowed to send commands directly to shards (CVE-2021-32037)</title>
      <description><![CDATA[<p>An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled environment.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Wed, 24 Nov 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-59071</link>
      <guid>https://jira.mongodb.org/browse/SERVER-59071#1</guid>
    </item>
    <item>
      <title>Specific replication command with malformed oplog entries can crash secondaries (CVE-2021-20330)</title>
      <description><![CDATA[<p>An attacker with basic CRUD permissions on a replicated collection can run the applyOps command with specially malformed oplog entries, resulting in a potential denial of service on secondaries. This issue affects MongoDB Server v4.0 versions prior to 4.0.25; MongoDB Server v4.2 versions prior to 4.2.14; MongoDB Server v4.4 versions prior to 4.4.6.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Wed, 15 Dec 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-36263</link>
      <guid>https://jira.mongodb.org/browse/SERVER-36263#1</guid>
    </item>
    <item>
      <title>MongoDB Extension for VS Code may unexpectedly store credentials locally in clear text (CVE-2021-32039)</title>
      <description><![CDATA[<p>Users with appropriate file access may be able to access unencrypted user credentials saved by MongoDB Extension for VS Code in a binary file. These credentials may be used by malicious attackers to perform unauthorized actions. This vulnerability affects all MongoDB Extension for VS Code including and prior to version 0.7.0</p>
 <br> CVSS Score has been rated as 5.5]]></description>
      <pubDate>Thu, 20 Jan 2022 00:00:00 GMT</pubDate>
      <link>https://github.com/mongodb-js/vscode/releases/tag/v0.8.0</link>
      <guid>https://github.com/mongodb-js/vscode/releases/tag/v0.8.0#1</guid>
    </item>
    <item>
      <title>Denial of Service and Data Integrity vulnerability in features command (CVE-2021-32036)</title>
      <description><![CDATA[<p>An authenticated user without any specific authorizations may be able to repeatedly invoke the features command where at a high volume may lead to resource depletion or generate high lock contention. This may result in denial of service and in rare cases could result in id field collisions.</p>
 <br> CVSS Score has been rated as 5.4]]></description>
      <pubDate>Fri, 04 Feb 2022 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-59294</link>
      <guid>https://jira.mongodb.org/browse/SERVER-59294#1</guid>
    </item>
    <item>
      <title>Large aggregation pipelines with a specific stage can crash mongod under default configuration (CVE-2021-32040)</title>
      <description><![CDATA[<p>It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB versions prior to 5.0.4, 4.4.11, 4.2.16.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Tue, 12 Apr 2022 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-58203</link>
      <guid>https://jira.mongodb.org/browse/SERVER-58203#1</guid>
    </item>
    <item>
      <title>MongoDB Server (mongod) may crash in response to unexpected requests (CVE-2022-24272)</title>
      <description><![CDATA[<p>An authenticated user may trigger an invariant assertion during command dispatch due to incorrect validation on the $external database. This may result in mongod denial of service or server crash. This issue affects: MongoDB Inc. MongoDB Server v5.0 versions, prior to and including v5.0.6.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Wed, 11 May 2022 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-63968</link>
      <guid>https://jira.mongodb.org/browse/SERVER-63968#1</guid>
    </item>
    <item>
      <title>MongoDB Ops Manager may disclose sensitive information in Diagnostic Archive (CVE-2023-0342)</title>
      <description><![CDATA[<p>MongoDB Ops Manager Diagnostics Archive may not redact sensitive PEM key file password app settings. Archives do not include the PEM files themselves. This issue affects MongoDB Ops Manager v5.0 prior to 5.0.21 and MongoDB Ops Manager v6.0 prior to 6.0.12</p>
 <br> CVSS Score has been rated as 3.1]]></description>
      <pubDate>Fri, 09 Jun 2023 11:00:00 GMT</pubDate>
      <link>https://www.mongodb.com/docs/ops-manager/current/release-notes/application/#onprem-server-6-0-12</link>
      <guid>https://www.mongodb.com/docs/ops-manager/current/release-notes/application/#onprem-server-6-0-12#1</guid>
    </item>
    <item>
      <title>Deserializing compromised object with MongoDB .NET/C# Driver may cause remote code execution (CVE-2022-48282)</title>
      <description><![CDATA[<p>Under very specific circumstances (see Required configuration section below), a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0Following configuration must be true for the vulnerability to be applicable:  *  Application must written in C# taking arbitrary data from users and serializing data using _t without any validation AND  *  Application must be running on a Windows host using the full .NET Framework, not .NET Core AND  *  Application must have domain model class with a property/field explicitly of type System.Object or a collection of type System.Object (against MongoDB best practice) AND  *  Malicious attacker must have unrestricted insert access to target database to add a _t discriminator.&quot;Following configuration must be true for the vulnerability to be applicable</p>
 <br> CVSS Score has been rated as 6.6]]></description>
      <pubDate>Tue, 21 Feb 2023 19:39:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/CSHARP-4475</link>
      <guid>https://jira.mongodb.org/browse/CSHARP-4475#1</guid>
    </item>
    <item>
      <title>Privilege Escalation for Project Owner and Project User Admin Roles in Ops Manager (CVE-2023-4009)</title>
      <description><![CDATA[<p>In MongoDB Ops Manager v5.0 prior to 5.0.22 and v6.0 prior to 6.0.17 it is possible for an authenticated user with project owner or project user admin access to generate an API key with the privileges of org owner resulting in privilege escalation.</p>
 <br> CVSS Score has been rated as 7.2]]></description>
      <pubDate>Tue, 08 Aug 2023 10:30:00 GMT</pubDate>
      <link>https://www.mongodb.com/docs/ops-manager/current/release-notes/application/#onprem-server-6-0</link>
      <guid>https://www.mongodb.com/docs/ops-manager/current/release-notes/application/#onprem-server-6-0#1</guid>
    </item>
    <item>
      <title>Kubernetes Operator generates potentially insecure certificates (CVE-2020-7922)</title>
      <description><![CDATA[<p>X.509 certificates generated by the MongoDB Enterprise Kubernetes Operator may allow an attacker with access to the Kubernetes cluster improper access to MongoDB instances. Customers who do not use X.509 authentication, and those who do not use the Operator to generate their X.509 certificates are unaffected. This issue affects: MongoDB Inc. MongoDB Enterprise Kubernetes Operator version 1.0, 1.1, 1.2 versions prior to 1.2.4, 1.3 versions prior to 1.3.1, 1.2, 1.4 versions prior to 1.4.4.</p>
 <br> CVSS Score has been rated as 6.4]]></description>
      <pubDate>Thu, 09 Apr 2020 00:00:00 GMT</pubDate>
      <link>https://github.com/mongodb/mongodb-enterprise-kubernetes/releases/tag/1.2.5</link>
      <guid>https://github.com/mongodb/mongodb-enterprise-kubernetes/releases/tag/1.2.5#1</guid>
    </item>
    <item>
      <title>Secret logging may occur in debug mode of Atlas Operator  (CVE-2023-0436)</title>
      <description><![CDATA[<p>The affected versions of MongoDB Atlas Kubernetes Operator may print sensitive information like GCP service account keys and API integration secrets while DEBUG mode logging is enabled. This issue affects MongoDB Atlas Kubernetes Operator versions: 1.5.0, 1.6.0, 1.6.1, 1.7.0.Please note that this is reported on an EOL version of the product, and users are advised to upgrade to the latest supported version.Required Configuration:DEBUG logging is not enabled by default, and must be configured by the end-user. To check the log-level of the Operator, review the flags passed in your deployment configuration (eg.  <a href="https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27">https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27</a> <a href="https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27">https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27</a> )</p>
 <br> CVSS Score has been rated as 4.5]]></description>
      <pubDate>Tue, 07 Nov 2023 12:41:00 GMT</pubDate>
      <link>https://github.com/mongodb/mongodb-atlas-kubernetes/releases/tag/v1.7.1</link>
      <guid>https://github.com/mongodb/mongodb-atlas-kubernetes/releases/tag/v1.7.1#1</guid>
    </item>
    <item>
      <title>MongoDB client C Driver may infinitely loop when validating certain BSON input data (CVE-2023-0437)</title>
      <description><![CDATA[<p>When calling bson_utf8_validateon some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.</p>
 <br> CVSS Score has been rated as 5.3]]></description>
      <pubDate>Fri, 12 Jan 2024 14:13:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/CDRIVER-4747</link>
      <guid>https://jira.mongodb.org/browse/CDRIVER-4747#1</guid>
    </item>
    <item>
      <title>MongoDB Server may allow successful untrusted connection  (CVE-2024-1351)</title>
      <description><![CDATA[<p>Under certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections  that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28.Required Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured.</p>
 <br> CVSS Score has been rated as 8.8]]></description>
      <pubDate>Thu, 07 Mar 2024 09:31:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-72839</link>
      <guid>https://jira.mongodb.org/browse/SERVER-72839#1</guid>
    </item>
    <item>
      <title>Some MongoDB Drivers may publish events containing authentication-related data to a command listener configured by an application (CVE-2021-32050)</title>
      <description><![CDATA[<p>Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).</p>
 <br> CVSS Score has been rated as 4.2]]></description>
      <pubDate>Tue, 29 Aug 2023 15:24:30 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/PHPC-1869</link>
      <guid>https://jira.mongodb.org/browse/PHPC-1869#1</guid>
    </item>
    <item>
      <title>Insufficient validation of external input in Compass may enable MITM attacks (CVE-2024-3371)</title>
      <description><![CDATA[<p>MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.42.0.</p>
 <br> CVSS Score has been rated as 7.1]]></description>
      <pubDate>Wed, 24 Apr 2024 16:32:07 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/COMPASS-7260</link>
      <guid>https://jira.mongodb.org/browse/COMPASS-7260#1</guid>
    </item>
    <item>
      <title>MongoDB Server (mongod) may crash when generating ftdc (CVE-2024-3374)</title>
      <description><![CDATA[<p>An unauthenticated user can trigger a fatal assertion in the server while generating ftdc diagnostic metrics due to attempting to build a BSON object that exceeds certain memory sizes. This issue affects MongoDB Server v5.0 versions prior to and including 5.0.16 and MongoDB Server v6.0 versions prior to and including 6.0.5.</p>
 <br> CVSS Score has been rated as 5.3]]></description>
      <pubDate>Tue, 14 May 2024 13:26:42 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-75601</link>
      <guid>https://jira.mongodb.org/browse/SERVER-75601#1</guid>
    </item>
    <item>
      <title>MongoDB Server may have unexpected application behaviour due to invalid BSON (CVE-2024-3372)</title>
      <description><![CDATA[<p>Improper validation of certain metadata input may result in the server not correctly serialising BSON. This can be performed pre-authentication and may cause unexpected application behavior including unavailability of serverStatus responses. This issue affects MongoDB Server v7.0 versions prior to 7.0.6, MongoDB Server v6.0 versions prior to 6.0.14 and MongoDB Server v.5.0 versions prior to 5.0.25.</p>
 <br> CVSS Score has been rated as 7.5]]></description>
      <pubDate>Tue, 14 May 2024 13:24:05 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-85263</link>
      <guid>https://jira.mongodb.org/browse/SERVER-85263#1</guid>
    </item>
    <item>
      <title>Out-of-bounds read in bson module of PyMongo (CVE-2024-5629)</title>
      <description><![CDATA[<p>An out-of-bounds read in the &#39;bson&#39; module of PyMongo 4.6.2 or earlier allows deserialization of malformed BSON provided by a Server to raise an exception which may contain arbitrary application memory.</p>
 <br> CVSS Score has been rated as 4.7]]></description>
      <pubDate>Wed, 05 Jun 2024 14:32:56 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/PYTHON-4305</link>
      <guid>https://jira.mongodb.org/browse/PYTHON-4305#1</guid>
    </item>
    <item>
      <title>ejson shell parser in MongoDB Compass maybe bypassed (CVE-2024-6376)</title>
      <description><![CDATA[<p>MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass&#39; connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2</p>
 <br> CVSS Score has been rated as 7]]></description>
      <pubDate>Mon, 01 Jul 2024 14:57:31 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/COMPASS-7496</link>
      <guid>https://jira.mongodb.org/browse/COMPASS-7496#1</guid>
    </item>
    <item>
      <title>Missing authorization check may lead to shard key refinement (CVE-2024-6375)</title>
      <description><![CDATA[<p>A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3.</p>
 <br> CVSS Score has been rated as 5.4]]></description>
      <pubDate>Mon, 01 Jul 2024 14:40:32 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-79327</link>
      <guid>https://jira.mongodb.org/browse/SERVER-79327#1</guid>
    </item>
    <item>
      <title>MongoDB C Driver bson_strfreev may be susceptible to integer overflow (CVE-2024-6381)</title>
      <description><![CDATA[<p>The bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2</p>
 <br> CVSS Score has been rated as 4]]></description>
      <pubDate>Tue, 02 Jul 2024 17:14:48 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/CDRIVER-5622</link>
      <guid>https://jira.mongodb.org/browse/CDRIVER-5622#1</guid>
    </item>
    <item>
      <title>Adversarial unsanitized input may cause MongoDB Rust Driver to issue unintended commands. (CVE-2024-6382)</title>
      <description><![CDATA[<p>Incorrect handling of certain string inputs may result in MongoDB Rust driver constructing unintended server commands. This may cause unexpected application behavior including data modification. This issue affects MongoDB Rust Driver 2.0 versions prior to 2.8.2</p>
 <br> CVSS Score has been rated as 6.4]]></description>
      <pubDate>Tue, 02 Jul 2024 17:17:50 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/RUST-1881</link>
      <guid>https://jira.mongodb.org/browse/RUST-1881#1</guid>
    </item>
    <item>
      <title>MongoDB C Driver bson_string_append may be vulnerable to a buffer overflow (CVE-2024-6383)</title>
      <description><![CDATA[<p>The bson_string_append function in MongoDB C Driver may be vulnerable to a buffer overflow where the function might attempt to allocate too small of buffer and may lead to memory corruption of neighbouring heap memory. This issue affects libbson versions prior to 1.27.1</p>
 <br> CVSS Score has been rated as 5.3]]></description>
      <pubDate>Wed, 03 Jul 2024 21:33:47 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/CDRIVER-5628</link>
      <guid>https://jira.mongodb.org/browse/CDRIVER-5628#1</guid>
    </item>
    <item>
      <title>Certificate validation issue in MongoDB Server running on Windows or macOS (CVE-2023-1409)</title>
      <description><![CDATA[<p>If the MongoDB Server running on Windows or macOS is configured to use TLS with a specific set of configuration options that are already known to work securely in other platforms (e.g. Linux), it is possible that client certificate validation may not be in effect, potentially allowing client to establish a TLS connection with the server that supplies any certificate.This issue affect all MongoDB Server v6.3 versions, MongoDB Server v5.0 versions v5.0.0 to v5.0.14 and all MongoDB Server v4.4 versions.</p>
 <br> CVSS Score has been rated as 5.3]]></description>
      <pubDate>Wed, 23 Aug 2023 16:18:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-73662</link>
      <guid>https://jira.mongodb.org/browse/SERVER-73662#1</guid>
    </item>
    <item>
      <title>Administrative action may disable enforcement of per-user IP whitelisting (CVE-2020-7921)</title>
      <description><![CDATA[<p>Improper serialization of internal state in the authorization subsystem in MongoDB Server&#39;s authorization subsystem permits a user with valid credentials to bypass IP whitelisting protection mechanisms following administrative action. This issue affects: MongoDB Inc. MongoDB Server 4.2 versions prior to 4.2.3; 4.0 versions prior to 4.0.15; 4.3 versions prior to 4.3.3; 3.6 versions prior to 3.6.18.</p>
 <br> CVSS Score has been rated as 4.6]]></description>
      <pubDate>Wed, 06 May 2020 11:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-45472</link>
      <guid>https://jira.mongodb.org/browse/SERVER-45472#1</guid>
    </item>
    <item>
      <title>Process termination via PID file manipulation (CVE-2019-2389)</title>
      <description><![CDATA[<p>Incorrect scoping of kill operations in MongoDB Server&#39;s packaged SysV init scripts allow users with write access to the PID file to insert arbitrary PIDs to be killed when the root user stops the MongoDB process via SysV init. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.11; v3.6 versions prior to 3.6.14; v3.4 versions prior to 3.4.22.</p>
 <br> CVSS Score has been rated as 5.3]]></description>
      <pubDate>Fri, 30 Aug 2019 11:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-40563</link>
      <guid>https://jira.mongodb.org/browse/SERVER-40563#1</guid>
    </item>
    <item>
      <title>Potential exposure of log information in Ops Manager (CVE-2019-2388)</title>
      <description><![CDATA[<p>In affected Ops Manager versions there is an exposed http route was that may allow attackers to view a specific access log of a publicly exposed Ops Manager instance. This issue affects: MongoDB Inc. MongoDB Ops Manager 4.0 versions 4.0.9, 4.0.10 and MongoDB Ops Manager 4.1 version 4.1.5.</p>
 <br> CVSS Score has been rated as 5.8]]></description>
      <pubDate>Wed, 13 May 2020 11:00:00 GMT</pubDate>
      <link>https://docs.opsmanager.mongodb.com/current/release-notes/application/#onprem-server-4-0</link>
      <guid>https://docs.opsmanager.mongodb.com/current/release-notes/application/#onprem-server-4-0#1</guid>
    </item>
    <item>
      <title>JS-bson may incorrectly serialise some requests (CVE-2019-2391)</title>
      <description><![CDATA[<p>Incorrect parsing of certain JSON input may result in js-bson not correctly serializing BSON. This may cause unexpected application behaviour including data disclosure. This issue affects: MongoDB Inc. js-bson library version 1.1.3 and prior to.</p>
 <br> CVSS Score has been rated as 4.2]]></description>
      <pubDate>Tue, 31 Mar 2020 11:00:00 GMT</pubDate>
      <link>https://github.com/mongodb/js-bson/releases/tag/v1.1.4</link>
      <guid>https://github.com/mongodb/js-bson/releases/tag/v1.1.4#1</guid>
    </item>
    <item>
      <title>Authorization session conflation (CVE-2019-2386)</title>
      <description><![CDATA[<p>After user deletion in MongoDB Server the improper invalidation of authorization sessions allows an authenticated user&#39;s session to persist and become conflated with new accounts, if those accounts reuse the names of deleted ones. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.9; v3.6 versions prior to 3.6.13; v3.4 versions prior to 3.4.22.</p>
 <br> CVSS Score has been rated as 7.1]]></description>
      <pubDate>Tue, 06 Aug 2019 11:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-38984</link>
      <guid>https://jira.mongodb.org/browse/SERVER-38984#1</guid>
    </item>
    <item>
      <title>Code execution on Windows via OpenSSL engine injection (CVE-2019-2390)</title>
      <description><![CDATA[<p>An unprivileged user or program on Microsoft Windows which can create OpenSSL configuration files in a fixed location may cause utility programs shipped with MongoDB server to run attacker defined code as the user running the utility. This issue affects: MongoDB Inc. MongoDB Server 4.0 prior to 4.0.11; 3.6 prior to 3.6.14; 3.4 prior to 3.4.22.</p>
 <br> CVSS Score has been rated as 8.2]]></description>
      <pubDate>Fri, 30 Aug 2019 11:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-42233</link>
      <guid>https://jira.mongodb.org/browse/SERVER-42233#1</guid>
    </item>
    <item>
      <title>Specific GeoQuery can cause DoS against MongoDB Server (CVE-2020-7923)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may cause denial of service by issuing specially crafted queries, which violate an invariant in the query subsystem&#39;s support for geoNear. This issue affects: MongoDB Inc. MongoDB Server v4.4 versions prior to 4.4.0-rc7; v4.2 versions prior to 4.2.8; v4.0 versions prior to 4.0.19.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Fri, 21 Aug 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-47773</link>
      <guid>https://jira.mongodb.org/browse/SERVER-47773#1</guid>
    </item>
    <item>
      <title>Denial of Service when processing malformed Role names (CVE-2020-7925)</title>
      <description><![CDATA[<p>Incorrect validation of user input in the role name parser may lead to use of uninitialized memory allowing an unauthenticated attacker to use a specially crafted request to cause a denial of service. This issue affects: MongoDB Inc. MongoDB Server v4.4 versions prior to 4.4.0-rc12; v4.2 versions prior to 4.2.9.</p>
 <br> CVSS Score has been rated as 7.5]]></description>
      <pubDate>Mon, 30 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-49142</link>
      <guid>https://jira.mongodb.org/browse/SERVER-49142#1</guid>
    </item>
    <item>
      <title>Specific query can cause a DoS against MongoDB Server (CVE-2020-7926)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may cause denial of service by issuing a specially crafted query which violates an invariant in the server selection subsystem. This issue affects: MongoDB Server version 4.4 prior to 4.4.1. Versions before 4.4 are not affected.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 30 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-50170</link>
      <guid>https://jira.mongodb.org/browse/SERVER-50170#1</guid>
    </item>
    <item>
      <title>Potential privilege escalation in Ops Manager API (CVE-2020-7927)</title>
      <description><![CDATA[<p>Specially crafted API calls may allow an authenticated user who holds Organization Owner privilege to obtain an API key with Global Role privilege. This issue affects MongoDB Ops Manager v4.2 versions 4.2.0-4.2.17, v4.3 versions 4.3.0-4.3.9 and v4.4 versions 4.4.0-4.4.2.</p>
 <br> CVSS Score has been rated as 8.1]]></description>
      <pubDate>Mon, 30 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://docs.opsmanager.mongodb.com/current/release-notes/application/#onprem-server-4-4-3</link>
      <guid>https://docs.opsmanager.mongodb.com/current/release-notes/application/#onprem-server-4-4-3#1</guid>
    </item>
    <item>
      <title>$mod can result in UB (CVE-2019-2392)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which use the $mod operator to overflow negative values. This issue affects: MongoDB Inc. MongoDB Server v4.4 versions prior to 4.4.1; v4.2 versions prior to 4.2.9; v4.0 versions prior to 4.0.20; v3.6 versions prior to 3.6.20.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 30 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-43699</link>
      <guid>https://jira.mongodb.org/browse/SERVER-43699#1</guid>
    </item>
    <item>
      <title>Crash while joining collections with $lookup (CVE-2019-2393)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which use $lookup and collations. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions prior to 3.6.15.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 30 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-43350</link>
      <guid>https://jira.mongodb.org/browse/SERVER-43350#1</guid>
    </item>
    <item>
      <title>Crash while handling internal Javascript exception types (CVE-2019-20923)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which throw unhandled Javascript exceptions containing types intended to be scoped to the Javascript engine&#39;s internals. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.7.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 30 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-39481</link>
      <guid>https://jira.mongodb.org/browse/SERVER-39481#1</guid>
    </item>
    <item>
      <title>Specially crafted query may result in a denial of service of mongod (CVE-2021-20326)</title>
      <description><![CDATA[<p>A user authorized to performing a specific type of find query may trigger a denial of service. This issue affects: MongoDB Inc. MongoDB Server v4.4 versions prior to 4.4.4.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Fri, 30 Apr 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-53929</link>
      <guid>https://jira.mongodb.org/browse/SERVER-53929#1</guid>
    </item>
    <item>
      <title>Improper neutralization of null byte leads to read overrun (CVE-2020-7928)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may trigger a read overrun and access arbitrary memory by issuing specially crafted queries. This issue affects: MongoDB Inc. MongoDB Server v4.4 versions prior to 4.4.1; v4.2 versions prior to 4.2.9; v4.0 versions prior to 4.0.20; v3.6 versions prior to 3.6.20.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 23 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-49404</link>
      <guid>https://jira.mongodb.org/browse/SERVER-49404#1</guid>
    </item>
    <item>
      <title>Post-auth queries on compound index may crash mongod (CVE-2018-20802)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries with compound indexes affecting QueryPlanner. This issue affects: MongoDB Inc. MongoDB Server v3.6 versions prior to 3.6.9, v4.0 versions prior to 4.0.3.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 30 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-36993</link>
      <guid>https://jira.mongodb.org/browse/SERVER-36993#1</guid>
    </item>
    <item>
      <title>Invariant failure in applyOps (CVE-2018-20804)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may trigger denial of service by issuing specially crafted applyOps invocations. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.10; v3.6 versions prior to 3.6.13.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 30 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-35636</link>
      <guid>https://jira.mongodb.org/browse/SERVER-35636#1</guid>
    </item>
    <item>
      <title>Invariant with $elemMatch (CVE-2018-20805)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which perform an $elemMatch This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.5; v3.6 versions prior to 3.6.10. This issue affects: MongoDB Inc. MongoDB Server 3.6 versions prior to 3.6.10; 4.0 versions prior to 4.0.5.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 30 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-38164</link>
      <guid>https://jira.mongodb.org/browse/SERVER-38164#1</guid>
    </item>
    <item>
      <title>Denial of service via malformed network packet (CVE-2019-20925)</title>
      <description><![CDATA[<p>An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions prior to 3.6.15; v3.4 versions prior to 3.4.24.</p>
 <br> CVSS Score has been rated as 7.5]]></description>
      <pubDate>Tue, 24 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-43751</link>
      <guid>https://jira.mongodb.org/browse/SERVER-43751#1</guid>
    </item>
    <item>
      <title>Infinite loop in aggregation expression (CVE-2018-20803)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which loop indefinitely in mathematics processing while retaining locks. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.5; v3.6 versions prior to 3.6.10; v3.4 versions prior to 3.4.19.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 23 Nov 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-38070</link>
      <guid>https://jira.mongodb.org/browse/SERVER-38070#1</guid>
    </item>
    <item>
      <title>SSL may be unexpectedly disabled during upgrade of multiple-server MongoDB Ops Manager (CVE-2021-20335)</title>
      <description><![CDATA[<p>For MongoDB Ops Manager &lt;= 4.2.24 with multiple OM application servers, that have SSL turned on for their MongoDB processes, the upgrade to MongoDB Ops Manager &lt;= 4.4.12 triggers a bug where Automation thinks SSL is being turned off, and can disable SSL temporarily for members of the cluster. This issue is temporary and eventually corrects itself after MongoDB Ops Manager instances have finished upgrading to MongoDB Ops Manager 4.4. In addition, customers must be running with clientCertificateMode=OPTIONAL / allowConnectionsWithoutCertificates=true to be impacted*.* Customers upgrading from Ops Manager 4.2.X to 4.2.24 and finally to Ops Manager 4.4.13+ are unaffected by this issue.</p>
 <br> CVSS Score has been rated as 6.7]]></description>
      <pubDate>Thu, 11 Feb 2021 00:00:00 GMT</pubDate>
      <link>https://docs.opsmanager.mongodb.com/v4.2/release-notes/application/#onprem-server-4-2-23</link>
      <guid>https://docs.opsmanager.mongodb.com/v4.2/release-notes/application/#onprem-server-4-2-23#1</guid>
    </item>
    <item>
      <title> MongoDB Node.js client side field level encryption library may not be validating KMS certificate (CVE-2021-20327)</title>
      <description><![CDATA[<p>A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS servers certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering client-side field level encryption (CSFLE) ineffective. This issue was discovered during internal testing and affects mongodb-client-encryption module version 1.2.0, which was available from 2021-Jan-29 and deprecated in the NPM Registry on 2021-Feb-04. This vulnerability does not impact driver traffic payloads with CSFLE-supported key services from applications residing inside the AWS, GCP, and Azure nework fabrics due to compensating controls in these environments. This issue does not impact driver workloads that dont use Field Level Encryption.</p>
 <br> CVSS Score has been rated as 6.4]]></description>
      <pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/NODE-3125</link>
      <guid>https://jira.mongodb.org/browse/NODE-3125#1</guid>
    </item>
    <item>
      <title> MongoDB Java driver client-side field level encryption not verifying KMS host name (CVE-2021-20328)</title>
      <description><![CDATA[<p>Specific versions of the Java driver that support client-side field level encryption (CSFLE) fail to perform correct host name verification on the KMS servers certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Java driver and the KMS service rendering Field Level Encryption ineffective. This issue was discovered during internal testing and affects all versions of the Java driver that support CSFLE. The Java async, Scala, and reactive streams drivers are not impacted. This vulnerability does not impact driver traffic payloads with CSFLE-supported key services originating from applications residing inside the AWS, GCP, and Azure network fabrics due to compensating controls in these environments. This issue does not impact driver workloads that dont use Field Level Encryption.</p>
 <br> CVSS Score has been rated as 6.4]]></description>
      <pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/JAVA-4017</link>
      <guid>https://jira.mongodb.org/browse/JAVA-4017#1</guid>
    </item>
    <item>
      <title>Specially crafted regex query can cause DoS (CVE-2020-7929)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may trigger denial of service by issuing specially crafted query contain a type of regex. This issue affects: MongoDB Inc. MongoDB Server v3.6 versions prior to 3.6.21 and MongoDB Server v4.0 versions prior to 4.0.20.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Fri, 26 Feb 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-51083</link>
      <guid>https://jira.mongodb.org/browse/SERVER-51083#1</guid>
    </item>
    <item>
      <title>Invariant failure when explaining a find with a UUID (CVE-2018-25004)</title>
      <description><![CDATA[<p>A user authorized to performing a specific type of query may trigger a denial of service by issuing a generic explain command on a find query. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.6; MongoDB Server v3.6 versions prior to 3.6.11.</p>
 <br> CVSS Score has been rated as 4.9]]></description>
      <pubDate>Fri, 26 Feb 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-38275</link>
      <guid>https://jira.mongodb.org/browse/SERVER-38275#1</guid>
    </item>
    <item>
      <title>Local privilege escalation in MongoDB Compass for Windows (CVE-2021-20334)</title>
      <description><![CDATA[<p>A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows.</p>
 <br> CVSS Score has been rated as 4.8]]></description>
      <pubDate>Tue, 06 Apr 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/COMPASS-4510</link>
      <guid>https://jira.mongodb.org/browse/COMPASS-4510#1</guid>
    </item>
    <item>
      <title>Specific command line parameter might result in accepting invalid certificate (CVE-2020-7924)</title>
      <description><![CDATA[<p>Usage of specific command line parameter in MongoDB Tools which was originally intended to just skip hostname checks, may result in MongoDB skipping all certificate validation. This may result in accepting invalid certificates.This issue affects: MongoDB Inc. MongoDB Database Tools 3.6 versions later than 3.6.5; 3.6 versions prior to 3.6.21; 4.0 versions prior to 4.0.21; 4.2 versions prior to 4.2.11; 100 versions prior to 100.2.0. MongoDB Inc. Mongomirror 0 versions later than 0.6.0.</p>
 <br> CVSS Score has been rated as 4.2]]></description>
      <pubDate>Mon, 12 Apr 2021 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/TOOLS-2587</link>
      <guid>https://jira.mongodb.org/browse/TOOLS-2587#1</guid>
    </item>
    <item>
      <title> Invariant in IndexBoundsBuilder (CVE-2019-20924)</title>
      <description><![CDATA[<p>A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries which trigger an invariant in the IndexBoundsBuilder. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.2.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Tue, 01 Dec 2020 00:00:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-44377</link>
      <guid>https://jira.mongodb.org/browse/SERVER-44377#1</guid>
    </item>
    <item>
      <title>MongoDB Connector for BI installation MSI leave ACLs unset on custom installation directories (CVE-2025-11535)</title>
      <description><![CDATA[<p>MongoDB Connector for BI installation viaMSIon Windows leaves ACLs unset on custom install directories allows Privilege Escalation.This issue affects MongoDB Connector for BI: from 2.0.0 through 2.14.24.</p>
 <br> CVSS Score has been rated as ]]></description>
      <pubDate>Wed, 08 Oct 2025 22:07:18 GMT</pubDate>
      <link>https://www.mongodb.com/docs/bi-connector/current/release-notes/#bi-2.14.25</link>
      <guid>https://www.mongodb.com/docs/bi-connector/current/release-notes/#bi-2.14.25#1</guid>
    </item>
    <item>
      <title>Configuration may unexpectedly disable certificate validation (CVE-2025-11695)</title>
      <description><![CDATA[<p>When tlsInsecure=False appears in a connection string, certificate validation is disabled.This vulnerability affects MongoDB Rust Driver versions prior to v3.2.5</p>
 <br> CVSS Score has been rated as 8]]></description>
      <pubDate>Mon, 13 Oct 2025 16:22:57 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/RUST-2264</link>
      <guid>https://jira.mongodb.org/browse/RUST-2264#1</guid>
    </item>
    <item>
      <title>Use-after-free in the MongoDB server query planner may lead to crash or undefined behavior (CVE-2025-11979)</title>
      <description><![CDATA[<p>An authorized user may crash the MongoDB server by causing buffer over-read. This can be done by issuing a DDL operation while queries are being issued, under some conditions. This issue affects MongoDB Server v7.0 versions prior to 7.0.25, MongoDB Server v8.0 versions prior to 8.0.15, and MongoDB Server version 8.2.0.</p>
 <br> CVSS Score has been rated as 5.3]]></description>
      <pubDate>Mon, 20 Oct 2025 17:47:57 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-105873</link>
      <guid>https://jira.mongodb.org/browse/SERVER-105873#1</guid>
    </item>
    <item>
      <title>MongoDB Atlas SQL ODBC driver installation via MSI may leave ACLs unset on custom installation directories (CVE-2025-11575)</title>
      <description><![CDATA[<p>Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.</p>
 <br> CVSS Score has been rated as ]]></description>
      <pubDate>Thu, 23 Oct 2025 00:22:00 GMT</pubDate>
      <link>https://www.mongodb.com/docs/atlas/release-notes/sql/</link>
      <guid>https://www.mongodb.com/docs/atlas/release-notes/sql/#1</guid>
    </item>
    <item>
      <title>MongoDB BI Connector ODBC driver installation via MSI may leave ACLs unset on custom installation directories (CVE-2025-12100)</title>
      <description><![CDATA[<p>Incorrect Default Permissions vulnerability in MongoDB BI Connector ODBC driver allows Privilege Escalation.This issue affects BI Connector ODBC driver: from 1.0.0 through 1.4.6.</p>
 <br> CVSS Score has been rated as ]]></description>
      <pubDate>Thu, 23 Oct 2025 21:02:18 GMT</pubDate>
      <link>https://github.com/mongodb/mongo-bi-connector-odbc-driver/releases/tag/v1.4.7</link>
      <guid>https://github.com/mongodb/mongo-bi-connector-odbc-driver/releases/tag/v1.4.7#1</guid>
    </item>
    <item>
      <title>Malformed KMIP response may result in access violation (CVE-2025-12657)</title>
      <description><![CDATA[<p>The KMIP response parser built into mongo binaries is overly tolerant of certain malformed packets, and may parse them into invalid objects. Later reads of this object can result in read access violations.</p>
 <br> CVSS Score has been rated as ]]></description>
      <pubDate>Mon, 03 Nov 2025 21:03:25 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-101230</link>
      <guid>https://jira.mongodb.org/browse/SERVER-101230#1</guid>
    </item>
    <item>
      <title>Bulk write with options may read invalid memory (CVE-2025-12119)</title>
      <description><![CDATA[<p>A mongoc_bulk_operation_t may read invalid memory if large options are passed.</p>
 <br> CVSS Score has been rated as ]]></description>
      <pubDate>Tue, 18 Nov 2025 20:21:08 GMT</pubDate>
      <link>https://github.com/mongodb/mongo-php-driver/releases/tag/1.21.2</link>
      <guid>https://github.com/mongodb/mongo-php-driver/releases/tag/1.21.2#1</guid>
    </item>
    <item>
      <title>Time-series operations may cause internal BSON size limit to be exceed (CVE-2025-13507)</title>
      <description><![CDATA[<p>Inconsistent object size validation in time series processing logic may result in later processing of oversized BSON documents leading to an assert failing and process termination. This issue impacts MongoDB Server v7.0 versions prior to 7.0.26, v8.0 versions prior to 8.0.16 and MongoDB server v8.2 versions prior to 8.2.1.</p>
 <br> CVSS Score has been rated as 7.1]]></description>
      <pubDate>Tue, 25 Nov 2025 04:52:47 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-108565</link>
      <guid>https://jira.mongodb.org/browse/SERVER-108565#1</guid>
    </item>
    <item>
      <title>Improper Certificate Validation May Allow Successful TLS Handshaking Despite Invalid Extended Key Usage Fields in MongoDB Server (CVE-2025-12893)</title>
      <description><![CDATA[<p>Clients may successfully perform a TLS handshake with a MongoDB server despite presenting a client certificate not aligning with the documented Extended Key Usage (EKU) requirements. A certificate that specifies extendedKeyUsage but is missing extendedKeyUsage = clientAuth may still be successfully authenticated via the TLS handshake as a client. This issue is specific to MongoDB servers running on Windows or Apple as the expected validation behavior functions correctly on Linux systems.Additionally, MongoDB servers may successfully establish egress TLS connections with servers that present server certificates not aligning with the documented Extended Key Usage (EKU) requirements. A certificate that specifies extendedKeyUsage but is missing extendedKeyUsage = serverAuth may still be successfully authenticated via the TLS handshake as a server. This issue is specific to MongoDB servers running on Apple as the expected validation behavior functions correctly on both Linux and Windows systems. This vulnerability affects MongoDB Server v7.0 versions prior to 7.0.26, MongoDB Server v8.0 versions prior to 8.0.16 and MongoDB Server v8.2 versions prior to 8.2.2</p>
 <br> CVSS Score has been rated as 4.2]]></description>
      <pubDate>Tue, 25 Nov 2025 05:07:17 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-105783</link>
      <guid>https://jira.mongodb.org/browse/SERVER-105783#1</guid>
    </item>
    <item>
      <title>MongoDB Server may allow queries to be terminated by unauthorized users (CVE-2025-13643)</title>
      <description><![CDATA[<p>A user with access to the cluster with a limited set of privilege actions may be able to terminate queries that are being executed by other users. This may cause a denial of service by preventing a fraction of queries from successfully completing. This issue affects MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB Server v8.0 versions prior to 8.0.14</p>
 <br> CVSS Score has been rated as 3.1]]></description>
      <pubDate>Tue, 25 Nov 2025 05:16:24 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-103582</link>
      <guid>https://jira.mongodb.org/browse/SERVER-103582#1</guid>
    </item>
    <item>
      <title>MongoDB may be susceptible to Invariant Failure due to batched delete (CVE-2025-13644)</title>
      <description><![CDATA[<p>MongoDB Server may experience an invariant failure during batched delete operations when handling documents. The issue arises when the server mistakenly assumes the presence of multiple documents in a batch based solely on document size exceeding BSONObjMaxSize. This issue affects MongoDB Server v7.0 versions prior to 7.0.26, MongoDB Server v8.0 versions prior to 8.0.13, and MongoDB Server v8.1 versions prior to 8.1.2</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Tue, 25 Nov 2025 05:23:12 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-101180</link>
      <guid>https://jira.mongodb.org/browse/SERVER-101180#1</guid>
    </item>
    <item>
      <title>Cross-Shard Failovers May Lead to Partial Transaction Commit in MongoDB Server (CVE-2025-14345)</title>
      <description><![CDATA[<p>A post-authenticationflaw in the network two-phase commit protocol used for cross-shard transactions in MongoDB Server may lead to logical data inconsistencies under specific conditions which are not predictable and exist for a very short period of time. This error can cause the transaction coordination logic to misinterpret the transaction as committed, resulting in inconsistent state on those shards. This may lead to low integrity and availability impact.This issue impacts MongoDB Server v8.0 versions prior to 8.0.16, MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB server v8.2 versions prior to 8.2.2.</p>
 <br> CVSS Score has been rated as 4.2]]></description>
      <pubDate>Tue, 09 Dec 2025 15:00:38 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-106075</link>
      <guid>https://jira.mongodb.org/browse/SERVER-106075#1</guid>
    </item>
    <item>
      <title>Zlib compressed protocol header length confusion may allow memory read (CVE-2025-14847)</title>
      <description><![CDATA[<p>Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.</p>
 <br> CVSS Score has been rated as 8.7]]></description>
      <pubDate>Fri, 19 Dec 2025 11:00:22 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-115508</link>
      <guid>https://jira.mongodb.org/browse/SERVER-115508#1</guid>
    </item>
    <item>
      <title>Accessing Untrusted Directory May Allow Local Privilege Escalation (CVE-2024-7553)</title>
      <description><![CDATA[<p>Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.Required Configuration:Only environments with Windows as the underlying operating system is affected by this issue</p>
 <br> CVSS Score has been rated as 7.3]]></description>
      <pubDate>Wed, 07 Aug 2024 09:57:49 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/PHPC-2369</link>
      <guid>https://jira.mongodb.org/browse/PHPC-2369#1</guid>
    </item>
    <item>
      <title>Unsafe Reflection in Mongoid::Criteria.from_hash (CVE-2026-2302)</title>
      <description><![CDATA[<p>Under specific conditions when processing a maliciously crafted value of type Hash r, Mongoid::Criteria.from_hash may allow for executing arbitrary Ruby code.</p>
 <br> CVSS Score has been rated as 6.9]]></description>
      <pubDate>Tue, 10 Feb 2026 18:59:23 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/MONGOID-5919</link>
      <guid>https://jira.mongodb.org/browse/MONGOID-5919#1</guid>
    </item>
    <item>
      <title>Pre-Authentication Memory Exhaustion Denial of Service in MongoDB Server (CVE-2026-25611)</title>
      <description><![CDATA[<p>A series of specifically crafted, unauthenticated messages can exhaust available memory and crash a MongoDB server.</p>
 <br> CVSS Score has been rated as 8.7]]></description>
      <pubDate>Tue, 10 Feb 2026 17:52:47 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-116210</link>
      <guid>https://jira.mongodb.org/browse/SERVER-116210#1</guid>
    </item>
    <item>
      <title>Internal ResourceId collision may affect unrelated collections (CVE-2026-25612)</title>
      <description><![CDATA[<p>The internal locking mechanism of the MongoDB server uses an internal encoding of the resources in order to choose what lock to take. Collections may inadvertently collide with one another in this representation causing unavailability between them due to conflicting locks.</p>
 <br> CVSS Score has been rated as 7.1]]></description>
      <pubDate>Tue, 10 Feb 2026 18:05:23 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-114838</link>
      <guid>https://jira.mongodb.org/browse/SERVER-114838#1</guid>
    </item>
    <item>
      <title>An unsafe cast in the MongoDB query planner can result in a segmentation fault. (CVE-2026-25613)</title>
      <description><![CDATA[<p>An authorized user may disable the MongoDB server by issuing a query against a collection that contains an invalid compound wildcard index.</p>
 <br> CVSS Score has been rated as 7.1]]></description>
      <pubDate>Tue, 10 Feb 2026 18:54:50 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-113685</link>
      <guid>https://jira.mongodb.org/browse/SERVER-113685#1</guid>
    </item>
    <item>
      <title>profile command may permit unauthorized configuration (CVE-2026-25609)</title>
      <description><![CDATA[<p>Incorrect validation of the profile command may result in the determination that a request altering the &#39;filter&#39; is read-only.</p>
 <br> CVSS Score has been rated as 5.3]]></description>
      <pubDate>Tue, 10 Feb 2026 18:39:11 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-112952</link>
      <guid>https://jira.mongodb.org/browse/SERVER-112952#1</guid>
    </item>
    <item>
      <title>Invalid $geoNear index hint may cause server crash (CVE-2026-25610)</title>
      <description><![CDATA[<p>An authorized user may trigger a server crash by running a $geoNear pipeline with certain invalid index hints.</p>
 <br> CVSS Score has been rated as 7.1]]></description>
      <pubDate>Tue, 10 Feb 2026 18:30:40 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-99119</link>
      <guid>https://jira.mongodb.org/browse/SERVER-99119#1</guid>
    </item>
    <item>
      <title>An authorized user may disable the MongoDB server by issuing a certain type of complex query due to boolean expression simplification (CVE-2026-1850)</title>
      <description><![CDATA[<p>Complex queries can cause excessive memory usage in MongoDB Query Planner resulting in an Out-Of-Memory Crash.</p>
 <br> CVSS Score has been rated as 7.1]]></description>
      <pubDate>Tue, 10 Feb 2026 18:49:32 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-114126</link>
      <guid>https://jira.mongodb.org/browse/SERVER-114126#1</guid>
    </item>
    <item>
      <title>Mongod can run out of stack memory when expressions create deeply nested documents (CVE-2026-1849)</title>
      <description><![CDATA[<p>MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce deeply nested documents. The issue arises in recursive functions because the server does not periodically check the depth of the expression.</p>
 <br> CVSS Score has been rated as 7.1]]></description>
      <pubDate>Tue, 10 Feb 2026 18:52:52 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-102364</link>
      <guid>https://jira.mongodb.org/browse/SERVER-102364#1</guid>
    </item>
    <item>
      <title>Connections received from the proxy port may not count towards total accepted connections (CVE-2026-1848)</title>
      <description><![CDATA[<p>Connections received from the proxy port may not count towards total accepted connections, resulting in server crashes if the total number of connections exceeds available resources. This only applies to connections accepted from the proxy port, pending the proxy protocol header.</p>
 <br> CVSS Score has been rated as 8.2]]></description>
      <pubDate>Tue, 10 Feb 2026 18:22:41 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-114695</link>
      <guid>https://jira.mongodb.org/browse/SERVER-114695#1</guid>
    </item>
    <item>
      <title>MongoDB Server may crash when inserting large documents (CVE-2026-1847)</title>
      <description><![CDATA[<p>Inserting certain large documents into a replica set could lead to replica set secondaries not being able to fetch the oplog from the primary. This could stall replication inside the replica set leading to server crash.</p>
 <br> CVSS Score has been rated as 7.1]]></description>
      <pubDate>Tue, 10 Feb 2026 18:16:24 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-113532</link>
      <guid>https://jira.mongodb.org/browse/SERVER-113532#1</guid>
    </item>
    <item>
      <title>Integer Overflow in GridFS chunkSize Leading to Heap Allocation Failure (CVE-2025-14911)</title>
      <description><![CDATA[<p>User-controlled chunkSize metadata from MongoDB lacks appropriate validation allowing malformed GridFS metadata to overflow the bounding container.</p>
 <br> CVSS Score has been rated as 7.1]]></description>
      <pubDate>Tue, 27 Jan 2026 17:29:21 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/CDRIVER-6125</link>
      <guid>https://jira.mongodb.org/browse/CDRIVER-6125#1</guid>
    </item>
    <item>
      <title>Stack memory disclosure in filemd5 command (CVE-2026-4147)</title>
      <description><![CDATA[<p>An authenticated user with the read role may read limited amounts of uninitialized stack memory via specially-crafted issuances of the filemd5 command.</p>
 <br> CVSS Score has been rated as 7.1]]></description>
      <pubDate>Tue, 17 Mar 2026 15:50:21 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-119317</link>
      <guid>https://jira.mongodb.org/browse/SERVER-119317#1</guid>
    </item>
    <item>
      <title>ExpressionContext use-after-free in classic engine $lookup and $graphLookup aggregation operators (CVE-2026-4148)</title>
      <description><![CDATA[<p>A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.</p>
 <br> CVSS Score has been rated as 8.7]]></description>
      <pubDate>Tue, 17 Mar 2026 15:53:57 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-119319</link>
      <guid>https://jira.mongodb.org/browse/SERVER-119319#1</guid>
    </item>
    <item>
      <title>Heap Out-of-Bounds Read in Go Driver GSSAPI C Wrappers enables application crash or information leak (CVE-2026-2303)</title>
      <description><![CDATA[<p>The mongo-go-driver repositorycontains CGo bindings for GSSAPI (Kerberos) authentication on Linux and macOS. The C wrapper implementation contains a heap out-of-bounds read vulnerability due to incorrect assumptions about string termination in the GSSAPI standard. Since GSSAPI buffers are not guaranteed to be null-terminated or have extra padding, this results in reading one byte past the allocated heap buffer.</p>
 <br> CVSS Score has been rated as 6.9]]></description>
      <pubDate>Tue, 10 Feb 2026 19:03:06 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/GODRIVER-3770</link>
      <guid>https://jira.mongodb.org/browse/GODRIVER-3770#1</guid>
    </item>
    <item>
      <title>Backup files may be downloaded by underprivileged users in MongoDB Enterprise Server (CVE-2024-6384)</title>
      <description><![CDATA[<p>&quot;Hot&quot; backup files may be downloaded by underprivileged users, if they are capable of acquiring a unique backup identifier. This issue affects MongoDB Enterprise Server v6.0 versions prior to 6.0.16, MongoDB Enterprise Server v7.0 versions prior to 7.0.11 and MongoDB Enterprise Server v7.3 versions prior to 7.3.3</p>
 <br> CVSS Score has been rated as 5.3]]></description>
      <pubDate>Tue, 13 Aug 2024 14:22:22 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-93516</link>
      <guid>https://jira.mongodb.org/browse/SERVER-93516#1</guid>
    </item>
    <item>
      <title>MongoDB Server binaries may load potentially insecure shared libraries from specific relative paths (CVE-2024-8207)</title>
      <description><![CDATA[<p>In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3.Required Configuration: Only environments with Linux as the underlying operating system is affected by this issue</p>
 <br> CVSS Score has been rated as 6.4]]></description>
      <pubDate>Tue, 27 Aug 2024 11:28:06 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-69507</link>
      <guid>https://jira.mongodb.org/browse/SERVER-69507#1</guid>
    </item>
    <item>
      <title>MongoDB Server may access non-initialized region of memory leading to unexpected behaviour (CVE-2024-8654)</title>
      <description><![CDATA[<p>MongoDB Server may access non-initialized region of memory leading to unexpected behaviour when zero arguments are called in internal aggregation stage. This issue affected MongoDB Server v6.0 version 6.0.3.</p>
 <br> CVSS Score has been rated as 5]]></description>
      <pubDate>Tue, 10 Sep 2024 13:35:50 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-71477</link>
      <guid>https://jira.mongodb.org/browse/SERVER-71477#1</guid>
    </item>
    <item>
      <title>MongoDB Server secondaries may crash due to forced index constraints (CVE-2024-8305)</title>
      <description><![CDATA[<p>prepareUnique index may cause secondaries to crash due to incorrect enforcement of index constraints on secondaries, where in extreme cases may cause multiple secondaries crashing leading to no primaries. This issue affects MongoDB Server v6.0 versions prior to 6.0.17, MongoDB Server v7.0 versions prior to 7.0.13 and MongoDB Server v7.3 versions prior to 7.3.4</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 21 Oct 2024 14:10:31 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-92382</link>
      <guid>https://jira.mongodb.org/browse/SERVER-92382#1</guid>
    </item>
    <item>
      <title>CSFLE and Queryable Encryption self-lookup may fail to encrypt values in subpipelines (CVE-2024-8013)</title>
      <description><![CDATA[<p>A bug in query analysis of certain complex self-referential $lookup subpipelines may result in literal values in expressions for encrypted fields to be sent to the server as plaintext instead of ciphertext. Should this occur, no documents would be returned or written. This issue affects mongocryptd binary (v5.0 versions prior to 5.0.29, v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) and mongo_crypt_v1.so shared libraries (v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) released alongside MongoDB Enterprise Server versions.</p>
 <br> CVSS Score has been rated as 2.2]]></description>
      <pubDate>Mon, 28 Oct 2024 12:58:05 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-96254</link>
      <guid>https://jira.mongodb.org/browse/SERVER-96254#1</guid>
    </item>
    <item>
      <title>Improper neutralization of null bytes may lead to buffer over-reads in MongoDB Server (CVE-2024-10921)</title>
      <description><![CDATA[<p>An authorized user may trigger crashes or receive the contents of buffer over-reads of Server memory by issuing specially crafted requests that construct malformed BSON in the MongoDB Server. This issue affects MongoDB Server v5.0 versions prior to 5.0.30 , MongoDB Server v6.0 versions prior to 6.0.19, MongoDB Server v7.0 versions prior to 7.0.15 and MongoDB Server v8.0 versions prior to and including 8.0.2.</p>
 <br> CVSS Score has been rated as 6.8]]></description>
      <pubDate>Thu, 14 Nov 2024 16:04:04 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-96419</link>
      <guid>https://jira.mongodb.org/browse/SERVER-96419#1</guid>
    </item>
    <item>
      <title>MongoDB Shell may be susceptible to Control Character Injection via autocomplete (CVE-2025-1691)</title>
      <description><![CDATA[<p>The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the form of the user using tab to autocomplete text that is a prefix of the attackers prepared autocompletion. This issue affects mongosh versions prior to2.3.9.The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.</p>
 <br> CVSS Score has been rated as 7.6]]></description>
      <pubDate>Thu, 27 Feb 2025 12:34:02 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/MONGOSH-2024</link>
      <guid>https://jira.mongodb.org/browse/MONGOSH-2024#1</guid>
    </item>
    <item>
      <title>MongoDB Shell may be susceptible to control character injection via pasting (CVE-2025-1692)</title>
      <description><![CDATA[<p>The MongoDB Shell may be susceptible to control character injection where an attacker with control of the users clipboard could manipulate them to paste text into mongosh that evaluates arbitrary code. Control characters in the pasted text can be used to obfuscate malicious code. This issue affects mongosh versions prior to 2.3.9</p>
 <br> CVSS Score has been rated as 6.3]]></description>
      <pubDate>Thu, 27 Feb 2025 12:37:00 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/MONGOSH-2025</link>
      <guid>https://jira.mongodb.org/browse/MONGOSH-2025#1</guid>
    </item>
    <item>
      <title>MongoDB Shell may be susceptible to control character Injection via shell output (CVE-2025-1693)</title>
      <description><![CDATA[<p>The MongoDB Shell may be susceptible to control character injection where an attacker with control over the database cluster contents can inject control characters into the shell output. This may result in the display of falsified messages that appear to originate from mongosh or the underlying operating system, potentially misleading users into executing unsafe actions.The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.This issue affects mongosh versions prior to 2.3.9</p>
 <br> CVSS Score has been rated as 3.9]]></description>
      <pubDate>Thu, 27 Feb 2025 12:39:37 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/MONGOSH-2026</link>
      <guid>https://jira.mongodb.org/browse/MONGOSH-2026#1</guid>
    </item>
    <item>
      <title>MongoDB Compass may be susceptible to local privilege escalation in Windows (CVE-2025-1755)</title>
      <description><![CDATA[<p>MongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user&#39;s system with elevated privileges, when a crafted file is stored in C:\node_modules. This issue affects MongoDB Compass prior to 1.42.1</p>
 <br> CVSS Score has been rated as 7.5]]></description>
      <pubDate>Thu, 27 Feb 2025 15:24:07 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/COMPASS-9058</link>
      <guid>https://jira.mongodb.org/browse/COMPASS-9058#1</guid>
    </item>
    <item>
      <title>MongoDB Shell may be susceptible to local privilege escalation in Windows (CVE-2025-1756)</title>
      <description><![CDATA[<p>mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user&#39;s system with elevated privilege, when a crafted file is stored in C:\node_modules. This issue affects mongosh prior to 2.3.0</p>
 <br> CVSS Score has been rated as 7.5]]></description>
      <pubDate>Thu, 27 Feb 2025 15:28:11 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/MONGOSH-2028</link>
      <guid>https://jira.mongodb.org/browse/MONGOSH-2028#1</guid>
    </item>
    <item>
      <title>MongoDB C Driver bson library may be susceptible to buffer overflow (CVE-2025-0755)</title>
      <description><![CDATA[<p>The various bson_appendfunctions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16</p>
 <br> CVSS Score has been rated as 8.4]]></description>
      <pubDate>Tue, 18 Mar 2025 09:01:04 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-94461</link>
      <guid>https://jira.mongodb.org/browse/SERVER-94461#1</guid>
    </item>
    <item>
      <title>Malformed MongoDB wire protocol messages may cause mongos to crash (CVE-2025-3083)</title>
      <description><![CDATA[<p>Specifically crafted MongoDB wire protocol messages can cause mongos to crash during command validation. This can occur without using an authenticated connection. This issue affects MongoDB v5.0 versions prior to 5.0.31, MongoDB v6.0 versions prior to6.0.20 and MongoDB v7.0 versions prior to 7.0.16</p>
 <br> CVSS Score has been rated as 7.5]]></description>
      <pubDate>Tue, 01 Apr 2025 11:12:31 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-103152</link>
      <guid>https://jira.mongodb.org/browse/SERVER-103152#1</guid>
    </item>
    <item>
      <title>MongoDB Windows installation MSI may leave ACLs unset on custom installation directories (CVE-2025-10491)</title>
      <description><![CDATA[<p>The MongoDB Windows installation MSI may leave ACLs unset on custom installation directories allowing a local attacker to introduce executable code to MongoDB&#39;s process via DLL hijacking. This issue affects MongoDB Server v6.0 version prior to 6.0.25, MongoDB Server v7.0 version prior to 7.0.21 and MongoDB Server v8.0 version prior to 8.0.5</p>
 <br> CVSS Score has been rated as 7.8]]></description>
      <pubDate>Mon, 15 Sep 2025 16:04:54 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-51366</link>
      <guid>https://jira.mongodb.org/browse/SERVER-51366#1</guid>
    </item>
    <item>
      <title>MongoDB Server may crash due to improper validation of explain command (CVE-2025-3084)</title>
      <description><![CDATA[<p>When run on commands with certain arguments set, explain may fail to validate these arguments before using them. This can lead to crashes in router servers. This affects MongoDB Server v5.0 prior to 5.0.31, MongoDB Server v6.0 prior to 6.0.20, MongoDB Server v7.0 prior to 7.0.16 and MongoDB Server v8.0 prior to 8.0.4</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Tue, 01 Apr 2025 11:14:19 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-103153</link>
      <guid>https://jira.mongodb.org/browse/SERVER-103153#1</guid>
    </item>
    <item>
      <title>MongoDB Server running on Linux may allow unexpected connections where intermediate certificates are revoked (CVE-2025-3085)</title>
      <description><![CDATA[<p>A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer&#39;s certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.Required Configuration :MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled</p>
 <br> CVSS Score has been rated as 8.1]]></description>
      <pubDate>Tue, 01 Apr 2025 12:05:05 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-95445</link>
      <guid>https://jira.mongodb.org/browse/SERVER-95445#1</guid>
    </item>
    <item>
      <title>Running certain aggregation operations with the SBE engine may lead to unexpected behavior on MongoDB Server (CVE-2025-6706)</title>
      <description><![CDATA[<p>An authenticated user may trigger a use after free that may result in MongoDB Server crash and other unexpected behavior, even if the user does not have authorization to shut down a server.The crash is triggered on affected versions by issuing an aggregation framework operation using a specific combination of rarely-used aggregation pipeline expressions. This issue affects MongoDB Server v6.0 version prior to 6.0.21, MongoDB Server v7.0 version prior to 7.0.17 and MongoDB Server v8.0 version prior to 8.0.4 when the SBE engine is enabled.</p>
 <br> CVSS Score has been rated as 5]]></description>
      <pubDate>Thu, 26 Jun 2025 14:00:22 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-106746</link>
      <guid>https://jira.mongodb.org/browse/SERVER-106746#1</guid>
    </item>
    <item>
      <title>Race condition in privilege cache invalidation cycle (CVE-2025-6707)</title>
      <description><![CDATA[<p>Under certain conditions, an authenticated user request may execute with stale privileges following an intentional change by an authorized administrator. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.24, MongoDB Server v7.0 version prior to 7.0.21 and MongoDB Server v8.0 version prior to 8.0.5.</p>
 <br> CVSS Score has been rated as 4.2]]></description>
      <pubDate>Thu, 26 Jun 2025 14:04:46 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-93497</link>
      <guid>https://jira.mongodb.org/browse/SERVER-93497#1</guid>
    </item>
    <item>
      <title>Pre-Authentication Denial of Service Vulnerability in MongoDB Server&#39;s OIDC Authentication (CVE-2025-6709)</title>
      <description><![CDATA[<p>The MongoDB Server is susceptible to a denial of service vulnerability due to improper handling of specific date values in JSON input when using OIDC authentication. This can be reproduced using the mongo shell to send a malicious JSON payload leading to an invariant failure and server crash. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.The same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating.</p>
 <br> CVSS Score has been rated as 7.5]]></description>
      <pubDate>Thu, 26 Jun 2025 14:07:04 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-106748</link>
      <guid>https://jira.mongodb.org/browse/SERVER-106748#1</guid>
    </item>
    <item>
      <title>Pre-authentication Denial of Service Stack Overflow Vulnerability in JSON Parsing via Excessive Recursion in MongoDB (CVE-2025-6710)</title>
      <description><![CDATA[<p>MongoDB Server may be susceptible to stack overflow due to JSON parsing mechanism, where specifically crafted JSON inputs may induce unwarranted levels of recursion, resulting in excessive stack space consumption. Such inputs can lead to a stack overflow that causes the server to crash which could occur pre-authorisation. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.The same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating.</p>
 <br> CVSS Score has been rated as 7.5]]></description>
      <pubDate>Thu, 26 Jun 2025 14:09:29 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-106749</link>
      <guid>https://jira.mongodb.org/browse/SERVER-106749#1</guid>
    </item>
    <item>
      <title>Certain Queries with Duplicate _id Fields May Cause MongoDB Server to Crash (CVE-2025-7259)</title>
      <description><![CDATA[<p>An authorized user can issue queries with duplicate _id fields, that leads to unexpected behavior in MongoDB Server, which may result to crash. This issue can only be triggered by authorized users and cause Denial of Service. This issue affects MongoDB Server v8.1 version 8.1.0.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 07 Jul 2025 15:59:01 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-102693</link>
      <guid>https://jira.mongodb.org/browse/SERVER-102693#1</guid>
    </item>
    <item>
      <title>Incomplete Redaction of Sensitive Information in MongoDB Server Logs (CVE-2025-6711)</title>
      <description><![CDATA[<p>An issue has been identified in MongoDB Server where unredacted queries may inadvertently appear in server logs when certain error conditions are encountered. This issue affects MongoDB Server v8.0 versions prior to 8.0.5, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v6.0 versions prior to 6.0.21.</p>
 <br> CVSS Score has been rated as 4.4]]></description>
      <pubDate>Mon, 07 Jul 2025 14:42:16 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-98720</link>
      <guid>https://jira.mongodb.org/browse/SERVER-98720#1</guid>
    </item>
    <item>
      <title>MongoDB Server may be susceptible to DoS due to Accumulated Memory Allocation (CVE-2025-6712)</title>
      <description><![CDATA[<p>MongoDB Server may be susceptible to disruption caused by high memory usage, potentially leading to server crash. This condition is linked to inefficiencies in memory management related to internal operations. In scenarios where certain internal processes persist longer than anticipated, memory consumption can increase, potentially impacting server stability and availability. This issue affects MongoDB Server v8.0 versions prior to 8.0.10</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Mon, 07 Jul 2025 14:44:38 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-106751</link>
      <guid>https://jira.mongodb.org/browse/SERVER-106751#1</guid>
    </item>
    <item>
      <title>MongoDB Server may be susceptible to privilege escalation due to $mergeCursors stage (CVE-2025-6713)</title>
      <description><![CDATA[<p>An unauthorized user may leverage a specially crafted aggregation pipeline to access data without proper authorization due to improper handling of the $mergeCursors stage in MongoDB Server. This may lead to access to data without further authorisation. This issue affects MongoDB Server MongoDB Server v8.0 versions prior to 8.0.7, MongoDB Server v7.0 versions prior to 7.0.20 and MongoDB Server v6.0 versions prior to 6.0.22</p>
 <br> CVSS Score has been rated as 7.7]]></description>
      <pubDate>Mon, 07 Jul 2025 14:46:36 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-106752</link>
      <guid>https://jira.mongodb.org/browse/SERVER-106752#1</guid>
    </item>
    <item>
      <title>Incorrect Handling of incomplete data may prevent mongoS from Accepting New Connections (CVE-2025-6714)</title>
      <description><![CDATA[<p>MongoDB Server&#39;s mongos component can become unresponsive to new connections due to incorrect handling of incomplete data. This affects MongoDB when configured with load balancer support. This issue affects MongoDB Server v6.0 prior to 6.0.23, MongoDB Server v7.0 prior to 7.0.20 and MongoDB Server v8.0 prior to 8.0.9Required Configuration:This affects MongoDB sharded clusters when configured with load balancer support for mongos using HAProxy on specified ports.</p>
 <br> CVSS Score has been rated as 7.5]]></description>
      <pubDate>Mon, 07 Jul 2025 14:48:48 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-106753</link>
      <guid>https://jira.mongodb.org/browse/SERVER-106753#1</guid>
    </item>
    <item>
      <title>MongoDB Server router will crash when incorrect lsid is set on a sharded query (CVE-2025-10059)</title>
      <description><![CDATA[<p>An improper setting of the lsid field on any sharded query can cause a crash in MongoDB routers. This issue occurs when a generic argument (lsid) is provided in a case when it is not applicable. This affects MongoDB Server v6.0 versions prior to 6.0.x, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v8.0 versions prior to 8.0.6.</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Fri, 05 Sep 2025 20:26:52 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-100901</link>
      <guid>https://jira.mongodb.org/browse/SERVER-100901#1</guid>
    </item>
    <item>
      <title>MongoDB may be susceptible to Invariant Failure in Transactions due Upsert Operation (CVE-2025-10060)</title>
      <description><![CDATA[<p>MongoDB Server may allow upsert operations retried within a transaction to violate unique index constraints, potentially causing an invariant failure and server crash during commit. This issue may be triggered by improper WriteUnitOfWork state management.  This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22 and MongoDB Server v8.0 versions prior to 8.0.12</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Fri, 05 Sep 2025 20:39:14 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-95524</link>
      <guid>https://jira.mongodb.org/browse/SERVER-95524#1</guid>
    </item>
    <item>
      <title>Malformed $group Query May Cause MongoDB Server to Crash (CVE-2025-10061)</title>
      <description><![CDATA[<p>An authorized user can cause a crash in the MongoDB Server through a specially crafted $group query. This vulnerability is related to the incorrect handling of certain accumulator functions when additional parameters are specified within the $group operation. This vulnerability could lead to denial of service if triggered repeatedly. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22, MongoDB Server v8.0 versions prior to 8.0.12 and MongoDB Server v8.1 versions prior to 8.1.2</p>
 <br> CVSS Score has been rated as 6.5]]></description>
      <pubDate>Fri, 05 Sep 2025 20:48:25 GMT</pubDate>
      <link>https://jira.mongodb.org/browse/SERVER-99616</link>
      <guid>https://jira.mongodb.org/browse/SERVER-99616#1</guid>
    </item><atom:link href="https://www.mongodb.com/alerts/rss" rel="self" type="application/rss+xml" /></channel></rss>