CVE-2025-10061: CWE-20 Improper Input Validation in MongoDB Inc MongoDB Server
An authorized user can cause a crash in the MongoDB Server through a specially crafted $group query. This vulnerability is related to the incorrect handling of certain accumulator functions when additional parameters are specified within the $group operation. This vulnerability could lead to denial of service if triggered repeatedly. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22, MongoDB Server v8.0 versions prior to 8.0.12 and MongoDB Server v8.1 versions prior to 8.1.2
AI Analysis
Technical Summary
CVE-2025-10061 is a medium-severity vulnerability affecting multiple recent versions of MongoDB Server (6.0 prior to 6.0.25, 7.0 prior to 7.0.22, 8.0 prior to 8.0.12, and 8.1 prior to 8.1.2). The issue arises from improper input validation (CWE-20) within the $group aggregation stage of MongoDB queries. Specifically, when an authorized user crafts a $group query that uses certain accumulator functions with additional parameters, the server mishandles these inputs, leading to a crash. This crash results in a denial of service (DoS) condition if the exploit is triggered repeatedly. The vulnerability requires the attacker to have authorized access to the database, but does not require user interaction beyond sending the malicious query. The CVSS 3.1 base score is 6.5, reflecting a network attack vector with low complexity, requiring privileges but no user interaction, and resulting in availability impact only. No known exploits are currently reported in the wild. The root cause is insufficient validation of input parameters in aggregation operations, which can cause the server process to terminate unexpectedly, disrupting database availability.
Potential Impact
For European organizations relying on MongoDB Server for critical applications, this vulnerability poses a risk of service disruption through denial of service attacks. Since MongoDB is widely used in sectors such as finance, healthcare, e-commerce, and public services across Europe, a successful exploitation could interrupt business operations, degrade customer experience, and potentially cause cascading failures in dependent systems. Although the vulnerability does not allow data theft or modification, the loss of availability can have significant operational and reputational consequences. Organizations with multi-tenant environments or exposed database endpoints are particularly at risk. Repeated exploitation could lead to prolonged downtime, impacting compliance with service level agreements and regulatory requirements such as GDPR, which mandates availability and resilience of personal data processing systems.
Mitigation Recommendations
European organizations should promptly upgrade affected MongoDB Server instances to the fixed versions: 6.0.25 or later, 7.0.22 or later, 8.0.12 or later, and 8.1.2 or later. Until patches are applied, organizations should restrict database access strictly to trusted and authenticated users, minimizing the attack surface. Implement network-level controls such as IP whitelisting and VPNs to limit exposure of MongoDB endpoints. Monitor logs for unusual or malformed $group aggregation queries that could indicate attempted exploitation. Employ rate limiting on query submissions to reduce the risk of repeated triggering of the crash. Additionally, review and harden application-level input validation to prevent injection of malicious aggregation parameters. Regularly test backup and recovery procedures to ensure rapid restoration in case of service disruption. Finally, maintain up-to-date inventory of MongoDB deployments and versions to prioritize patching efforts effectively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-10061: CWE-20 Improper Input Validation in MongoDB Inc MongoDB Server
Description
An authorized user can cause a crash in the MongoDB Server through a specially crafted $group query. This vulnerability is related to the incorrect handling of certain accumulator functions when additional parameters are specified within the $group operation. This vulnerability could lead to denial of service if triggered repeatedly. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22, MongoDB Server v8.0 versions prior to 8.0.12 and MongoDB Server v8.1 versions prior to 8.1.2
AI-Powered Analysis
Technical Analysis
CVE-2025-10061 is a medium-severity vulnerability affecting multiple recent versions of MongoDB Server (6.0 prior to 6.0.25, 7.0 prior to 7.0.22, 8.0 prior to 8.0.12, and 8.1 prior to 8.1.2). The issue arises from improper input validation (CWE-20) within the $group aggregation stage of MongoDB queries. Specifically, when an authorized user crafts a $group query that uses certain accumulator functions with additional parameters, the server mishandles these inputs, leading to a crash. This crash results in a denial of service (DoS) condition if the exploit is triggered repeatedly. The vulnerability requires the attacker to have authorized access to the database, but does not require user interaction beyond sending the malicious query. The CVSS 3.1 base score is 6.5, reflecting a network attack vector with low complexity, requiring privileges but no user interaction, and resulting in availability impact only. No known exploits are currently reported in the wild. The root cause is insufficient validation of input parameters in aggregation operations, which can cause the server process to terminate unexpectedly, disrupting database availability.
Potential Impact
For European organizations relying on MongoDB Server for critical applications, this vulnerability poses a risk of service disruption through denial of service attacks. Since MongoDB is widely used in sectors such as finance, healthcare, e-commerce, and public services across Europe, a successful exploitation could interrupt business operations, degrade customer experience, and potentially cause cascading failures in dependent systems. Although the vulnerability does not allow data theft or modification, the loss of availability can have significant operational and reputational consequences. Organizations with multi-tenant environments or exposed database endpoints are particularly at risk. Repeated exploitation could lead to prolonged downtime, impacting compliance with service level agreements and regulatory requirements such as GDPR, which mandates availability and resilience of personal data processing systems.
Mitigation Recommendations
European organizations should promptly upgrade affected MongoDB Server instances to the fixed versions: 6.0.25 or later, 7.0.22 or later, 8.0.12 or later, and 8.1.2 or later. Until patches are applied, organizations should restrict database access strictly to trusted and authenticated users, minimizing the attack surface. Implement network-level controls such as IP whitelisting and VPNs to limit exposure of MongoDB endpoints. Monitor logs for unusual or malformed $group aggregation queries that could indicate attempted exploitation. Employ rate limiting on query submissions to reduce the risk of repeated triggering of the crash. Additionally, review and harden application-level input validation to prevent injection of malicious aggregation parameters. Regularly test backup and recovery procedures to ensure rapid restoration in case of service disruption. Finally, maintain up-to-date inventory of MongoDB deployments and versions to prioritize patching efforts effectively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mongodb
- Date Reserved
- 2025-09-05T20:41:48.167Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb4ec2535f4a97730ec319
Added to database: 9/5/2025, 8:57:38 PM
Last enriched: 9/5/2025, 9:12:46 PM
Last updated: 9/5/2025, 11:57:50 PM
Views: 5
Related Threats
CVE-2025-58375
LowCVE-2025-58373: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RooCodeInc Roo-Code
MediumCVE-2025-58371: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code
CriticalCVE-2025-58372: CWE-732: Incorrect Permission Assignment for Critical Resource in RooCodeInc Roo-Code
HighCVE-2025-58370: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.