CVE-2025-10059: CWE-732 Incorrect Permission Assignment for Critical Resource in MongoDB Inc MongoDB Server
An improper setting of the lsid field on any sharded query can cause a crash in MongoDB routers. This issue occurs when a generic argument (lsid) is provided in a case when it is not applicable. This affects MongoDB Server v6.0 versions prior to 6.0.x, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v8.0 versions prior to 8.0.6.
AI Analysis
Technical Summary
CVE-2025-10059 is a medium-severity vulnerability affecting MongoDB Server versions 6.0 prior to 6.0.x, 7.0 prior to 7.0.18, and 8.0 prior to 8.0.6. The issue arises from improper permission assignment related to the lsid (logical session identifier) field in sharded queries. Specifically, when an lsid argument is provided in contexts where it is not applicable, it causes the MongoDB routers (mongos instances) to crash. This vulnerability is categorized under CWE-732, which involves incorrect permission assignment for critical resources, indicating that the system improperly handles permissions or validation of input parameters. The crash results in a denial of service (DoS) condition, impacting availability but not confidentiality or integrity. The CVSS v3.1 score is 6.5 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are reported in the wild yet. The vulnerability affects MongoDB routers in sharded cluster deployments, which are common in large-scale or distributed database environments. The root cause is the acceptance of an invalid or improperly validated lsid parameter, which leads to a crash, potentially disrupting database operations and service availability. Since MongoDB is widely used for critical applications, this vulnerability can cause significant operational disruptions if exploited or triggered accidentally.
Potential Impact
For European organizations, the impact primarily concerns availability disruptions in environments using sharded MongoDB clusters. Organizations relying on MongoDB for critical applications, such as financial services, healthcare, e-commerce, and public sector services, may experience service outages or degraded performance due to router crashes. This can lead to downtime, loss of business continuity, and potential regulatory compliance issues related to service availability (e.g., GDPR mandates on data availability and integrity). Since the vulnerability requires low privileges but no user interaction, insider threats or compromised accounts with limited privileges could trigger the issue, increasing risk. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not eliminate operational risks. European organizations with complex, distributed MongoDB deployments are particularly vulnerable to denial of service conditions that could affect multi-region or multi-datacenter operations.
Mitigation Recommendations
1. Immediate patching: Organizations should prioritize upgrading MongoDB Server to versions 6.0.x or later, 7.0.18 or later, and 8.0.6 or later as soon as patches become available. 2. Access control: Restrict privileges to only trusted users and applications that can issue sharded queries, minimizing the risk of unauthorized or malformed lsid parameters. 3. Query validation: Implement application-layer validation to ensure that lsid parameters are only sent when applicable, preventing malformed queries from reaching the database. 4. Monitoring and alerting: Deploy monitoring on MongoDB router logs and metrics to detect abnormal crashes or restarts indicative of exploitation attempts. 5. Network segmentation: Isolate MongoDB routers within secure network segments to reduce exposure to untrusted networks and limit attack surface. 6. Incident response readiness: Prepare response plans for potential denial of service incidents affecting database availability, including failover and backup strategies. 7. Vendor communication: Maintain close contact with MongoDB Inc for updates, patches, and advisories related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-10059: CWE-732 Incorrect Permission Assignment for Critical Resource in MongoDB Inc MongoDB Server
Description
An improper setting of the lsid field on any sharded query can cause a crash in MongoDB routers. This issue occurs when a generic argument (lsid) is provided in a case when it is not applicable. This affects MongoDB Server v6.0 versions prior to 6.0.x, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v8.0 versions prior to 8.0.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-10059 is a medium-severity vulnerability affecting MongoDB Server versions 6.0 prior to 6.0.x, 7.0 prior to 7.0.18, and 8.0 prior to 8.0.6. The issue arises from improper permission assignment related to the lsid (logical session identifier) field in sharded queries. Specifically, when an lsid argument is provided in contexts where it is not applicable, it causes the MongoDB routers (mongos instances) to crash. This vulnerability is categorized under CWE-732, which involves incorrect permission assignment for critical resources, indicating that the system improperly handles permissions or validation of input parameters. The crash results in a denial of service (DoS) condition, impacting availability but not confidentiality or integrity. The CVSS v3.1 score is 6.5 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are reported in the wild yet. The vulnerability affects MongoDB routers in sharded cluster deployments, which are common in large-scale or distributed database environments. The root cause is the acceptance of an invalid or improperly validated lsid parameter, which leads to a crash, potentially disrupting database operations and service availability. Since MongoDB is widely used for critical applications, this vulnerability can cause significant operational disruptions if exploited or triggered accidentally.
Potential Impact
For European organizations, the impact primarily concerns availability disruptions in environments using sharded MongoDB clusters. Organizations relying on MongoDB for critical applications, such as financial services, healthcare, e-commerce, and public sector services, may experience service outages or degraded performance due to router crashes. This can lead to downtime, loss of business continuity, and potential regulatory compliance issues related to service availability (e.g., GDPR mandates on data availability and integrity). Since the vulnerability requires low privileges but no user interaction, insider threats or compromised accounts with limited privileges could trigger the issue, increasing risk. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not eliminate operational risks. European organizations with complex, distributed MongoDB deployments are particularly vulnerable to denial of service conditions that could affect multi-region or multi-datacenter operations.
Mitigation Recommendations
1. Immediate patching: Organizations should prioritize upgrading MongoDB Server to versions 6.0.x or later, 7.0.18 or later, and 8.0.6 or later as soon as patches become available. 2. Access control: Restrict privileges to only trusted users and applications that can issue sharded queries, minimizing the risk of unauthorized or malformed lsid parameters. 3. Query validation: Implement application-layer validation to ensure that lsid parameters are only sent when applicable, preventing malformed queries from reaching the database. 4. Monitoring and alerting: Deploy monitoring on MongoDB router logs and metrics to detect abnormal crashes or restarts indicative of exploitation attempts. 5. Network segmentation: Isolate MongoDB routers within secure network segments to reduce exposure to untrusted networks and limit attack surface. 6. Incident response readiness: Prepare response plans for potential denial of service incidents affecting database availability, including failover and backup strategies. 7. Vendor communication: Maintain close contact with MongoDB Inc for updates, patches, and advisories related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mongodb
- Date Reserved
- 2025-09-05T20:10:54.977Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb4b3f535f4a97730eac11
Added to database: 9/5/2025, 8:42:39 PM
Last enriched: 9/5/2025, 8:57:48 PM
Last updated: 9/5/2025, 11:45:18 PM
Views: 4
Related Threats
CVE-2025-58439: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in frappe erpnext
HighCVE-2025-58375
LowCVE-2025-58373: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RooCodeInc Roo-Code
MediumCVE-2025-58371: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code
CriticalCVE-2025-58372: CWE-732: Incorrect Permission Assignment for Critical Resource in RooCodeInc Roo-Code
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.