Skip to main content

CVE-2025-10061: CWE-20 Improper Input Validation in MongoDB Inc MongoDB Server

Medium
VulnerabilityCVE-2025-10061cvecve-2025-10061cwe-20
Published: Fri Sep 05 2025 (09/05/2025, 20:48:25 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB Inc
Product: MongoDB Server

Description

An authorized user can cause a crash in the MongoDB Server through a specially crafted $group query. This vulnerability is related to the incorrect handling of certain accumulator functions when additional parameters are specified within the $group operation. This vulnerability could lead to denial of service if triggered repeatedly. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22, MongoDB Server v8.0 versions prior to 8.0.12 and MongoDB Server v8.1 versions prior to 8.1.2

AI-Powered Analysis

AILast updated: 09/05/2025, 21:12:46 UTC

Technical Analysis

CVE-2025-10061 is a medium-severity vulnerability affecting multiple recent versions of MongoDB Server (6.0 prior to 6.0.25, 7.0 prior to 7.0.22, 8.0 prior to 8.0.12, and 8.1 prior to 8.1.2). The issue arises from improper input validation (CWE-20) within the $group aggregation stage of MongoDB queries. Specifically, when an authorized user crafts a $group query that uses certain accumulator functions with additional parameters, the server mishandles these inputs, leading to a crash. This crash results in a denial of service (DoS) condition if the exploit is triggered repeatedly. The vulnerability requires the attacker to have authorized access to the database, but does not require user interaction beyond sending the malicious query. The CVSS 3.1 base score is 6.5, reflecting a network attack vector with low complexity, requiring privileges but no user interaction, and resulting in availability impact only. No known exploits are currently reported in the wild. The root cause is insufficient validation of input parameters in aggregation operations, which can cause the server process to terminate unexpectedly, disrupting database availability.

Potential Impact

For European organizations relying on MongoDB Server for critical applications, this vulnerability poses a risk of service disruption through denial of service attacks. Since MongoDB is widely used in sectors such as finance, healthcare, e-commerce, and public services across Europe, a successful exploitation could interrupt business operations, degrade customer experience, and potentially cause cascading failures in dependent systems. Although the vulnerability does not allow data theft or modification, the loss of availability can have significant operational and reputational consequences. Organizations with multi-tenant environments or exposed database endpoints are particularly at risk. Repeated exploitation could lead to prolonged downtime, impacting compliance with service level agreements and regulatory requirements such as GDPR, which mandates availability and resilience of personal data processing systems.

Mitigation Recommendations

European organizations should promptly upgrade affected MongoDB Server instances to the fixed versions: 6.0.25 or later, 7.0.22 or later, 8.0.12 or later, and 8.1.2 or later. Until patches are applied, organizations should restrict database access strictly to trusted and authenticated users, minimizing the attack surface. Implement network-level controls such as IP whitelisting and VPNs to limit exposure of MongoDB endpoints. Monitor logs for unusual or malformed $group aggregation queries that could indicate attempted exploitation. Employ rate limiting on query submissions to reduce the risk of repeated triggering of the crash. Additionally, review and harden application-level input validation to prevent injection of malicious aggregation parameters. Regularly test backup and recovery procedures to ensure rapid restoration in case of service disruption. Finally, maintain up-to-date inventory of MongoDB deployments and versions to prioritize patching efforts effectively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mongodb
Date Reserved
2025-09-05T20:41:48.167Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bb4ec2535f4a97730ec319

Added to database: 9/5/2025, 8:57:38 PM

Last enriched: 9/5/2025, 9:12:46 PM

Last updated: 9/5/2025, 11:57:50 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats