CVE-2025-10060: CWE-672 Operation on a Resource after Expiration or Release in MongoDB Inc MongoDB Server
MongoDB Server may allow upsert operations retried within a transaction to violate unique index constraints, potentially causing an invariant failure and server crash during commit. This issue may be triggered by improper WriteUnitOfWork state management. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22 and MongoDB Server v8.0 versions prior to 8.0.12
AI Analysis
Technical Summary
CVE-2025-10060 is a vulnerability identified in MongoDB Server versions 6.0 prior to 6.0.25, 7.0 prior to 7.0.22, and 8.0 prior to 8.0.12. The issue arises from improper management of the WriteUnitOfWork state during upsert operations retried within a transaction. Specifically, the vulnerability allows these retried upsert operations to violate unique index constraints, which can lead to an invariant failure and cause the MongoDB server to crash during the commit phase of the transaction. This vulnerability is classified under CWE-672, which relates to operations on a resource after its expiration or release, indicating that the server attempts to perform operations on a resource that is no longer valid or has been released. The CVSS v3.1 base score is 6.5, reflecting a medium severity level. The vector indicates that the attack can be performed remotely (AV:N) with low attack complexity (AC:L), requires privileges (PR:L) but no user interaction (UI:N), and impacts availability (A:H) without affecting confidentiality or integrity. There are no known exploits in the wild at the time of publication, and no patches are linked in the provided data, though MongoDB has released fixed versions addressing this issue. The vulnerability primarily affects the availability of the MongoDB server by causing crashes, which can disrupt database services relying on these versions. This issue is particularly relevant for environments using transactions with upsert operations, especially where retry logic is implemented, as it may inadvertently trigger the server crash due to unique index constraint violations during commit.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of critical database services that rely on MongoDB Server versions affected by this flaw. Organizations using MongoDB in transactional contexts with upsert retries could experience unexpected server crashes, leading to downtime, potential data processing delays, and disruption of dependent applications and services. This can affect sectors such as finance, healthcare, e-commerce, and public services, where MongoDB is used for real-time data handling and transactional integrity. The disruption of database availability can lead to operational inefficiencies, loss of customer trust, and potential regulatory compliance issues, especially under GDPR where service continuity and data integrity are important. Since the vulnerability requires low privileges but no user interaction, insider threats or compromised accounts with limited privileges could exploit this to cause denial of service. However, the lack of known exploits in the wild reduces immediate risk, but organizations should not delay remediation given the potential impact on service availability.
Mitigation Recommendations
European organizations should prioritize upgrading MongoDB Server to the fixed versions: 6.0.25 or later for the 6.0 series, 7.0.22 or later for the 7.0 series, and 8.0.12 or later for the 8.0 series. Until upgrades are applied, organizations should audit and review transactional code that performs upsert operations with retries to minimize triggering the unique index constraint violation. Implementing stricter access controls to limit privileges to only necessary users can reduce the risk of exploitation. Monitoring MongoDB server logs for unusual transaction failures or crashes can provide early warning signs of attempted exploitation. Additionally, organizations should ensure robust backup and recovery procedures are in place to mitigate the impact of potential server crashes. Where possible, testing transactional workloads in staging environments after applying patches can validate stability. Network-level protections such as firewall rules restricting access to MongoDB instances and employing authentication mechanisms can further reduce exposure. Finally, staying informed through MongoDB security advisories and applying patches promptly is critical.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Switzerland
CVE-2025-10060: CWE-672 Operation on a Resource after Expiration or Release in MongoDB Inc MongoDB Server
Description
MongoDB Server may allow upsert operations retried within a transaction to violate unique index constraints, potentially causing an invariant failure and server crash during commit. This issue may be triggered by improper WriteUnitOfWork state management. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22 and MongoDB Server v8.0 versions prior to 8.0.12
AI-Powered Analysis
Technical Analysis
CVE-2025-10060 is a vulnerability identified in MongoDB Server versions 6.0 prior to 6.0.25, 7.0 prior to 7.0.22, and 8.0 prior to 8.0.12. The issue arises from improper management of the WriteUnitOfWork state during upsert operations retried within a transaction. Specifically, the vulnerability allows these retried upsert operations to violate unique index constraints, which can lead to an invariant failure and cause the MongoDB server to crash during the commit phase of the transaction. This vulnerability is classified under CWE-672, which relates to operations on a resource after its expiration or release, indicating that the server attempts to perform operations on a resource that is no longer valid or has been released. The CVSS v3.1 base score is 6.5, reflecting a medium severity level. The vector indicates that the attack can be performed remotely (AV:N) with low attack complexity (AC:L), requires privileges (PR:L) but no user interaction (UI:N), and impacts availability (A:H) without affecting confidentiality or integrity. There are no known exploits in the wild at the time of publication, and no patches are linked in the provided data, though MongoDB has released fixed versions addressing this issue. The vulnerability primarily affects the availability of the MongoDB server by causing crashes, which can disrupt database services relying on these versions. This issue is particularly relevant for environments using transactions with upsert operations, especially where retry logic is implemented, as it may inadvertently trigger the server crash due to unique index constraint violations during commit.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of critical database services that rely on MongoDB Server versions affected by this flaw. Organizations using MongoDB in transactional contexts with upsert retries could experience unexpected server crashes, leading to downtime, potential data processing delays, and disruption of dependent applications and services. This can affect sectors such as finance, healthcare, e-commerce, and public services, where MongoDB is used for real-time data handling and transactional integrity. The disruption of database availability can lead to operational inefficiencies, loss of customer trust, and potential regulatory compliance issues, especially under GDPR where service continuity and data integrity are important. Since the vulnerability requires low privileges but no user interaction, insider threats or compromised accounts with limited privileges could exploit this to cause denial of service. However, the lack of known exploits in the wild reduces immediate risk, but organizations should not delay remediation given the potential impact on service availability.
Mitigation Recommendations
European organizations should prioritize upgrading MongoDB Server to the fixed versions: 6.0.25 or later for the 6.0 series, 7.0.22 or later for the 7.0 series, and 8.0.12 or later for the 8.0 series. Until upgrades are applied, organizations should audit and review transactional code that performs upsert operations with retries to minimize triggering the unique index constraint violation. Implementing stricter access controls to limit privileges to only necessary users can reduce the risk of exploitation. Monitoring MongoDB server logs for unusual transaction failures or crashes can provide early warning signs of attempted exploitation. Additionally, organizations should ensure robust backup and recovery procedures are in place to mitigate the impact of potential server crashes. Where possible, testing transactional workloads in staging environments after applying patches can validate stability. Network-level protections such as firewall rules restricting access to MongoDB instances and employing authentication mechanisms can further reduce exposure. Finally, staying informed through MongoDB security advisories and applying patches promptly is critical.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mongodb
- Date Reserved
- 2025-09-05T20:28:10.874Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb4ec2535f4a97730ec31c
Added to database: 9/5/2025, 8:57:38 PM
Last enriched: 9/5/2025, 9:12:36 PM
Last updated: 9/6/2025, 2:31:01 AM
Views: 7
Related Threats
CVE-2025-9853: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in optio Optio Dentistry
MediumCVE-2025-9515: CWE-434 Unrestricted Upload of File with Dangerous Type in mondula2016 Multi Step Form
HighCVE-2025-9085: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpeverest User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin
MediumCVE-2025-8360: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in choijun LA-Studio Element Kit for Elementor
MediumCVE-2025-8359: CWE-288 Authentication Bypass Using an Alternate Path or Channel in scriptsbundle AdForest
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.