CVE-2025-10061: CWE-20 Improper Input Validation in MongoDB Inc MongoDB Server
An authorized user can cause a crash in the MongoDB Server through a specially crafted $group query. This vulnerability is related to the incorrect handling of certain accumulator functions when additional parameters are specified within the $group operation. This vulnerability could lead to denial of service if triggered repeatedly. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22, MongoDB Server v8.0 versions prior to 8.0.12 and MongoDB Server v8.1 versions prior to 8.1.2
AI Analysis
Technical Summary
CVE-2025-10061 is a medium-severity vulnerability affecting multiple recent versions of MongoDB Server (6.0 prior to 6.0.25, 7.0 prior to 7.0.22, 8.0 prior to 8.0.12, and 8.1 prior to 8.1.2). The issue arises from improper input validation (CWE-20) within the $group aggregation stage of MongoDB queries. Specifically, when an authorized user crafts a $group query that uses certain accumulator functions with additional parameters, the server mishandles these inputs, leading to a crash. This crash results in a denial of service (DoS) condition if the exploit is triggered repeatedly. The vulnerability requires the attacker to have authorized access to the database, but does not require user interaction beyond sending the malicious query. The CVSS 3.1 base score is 6.5, reflecting a network attack vector with low complexity, requiring privileges but no user interaction, and resulting in availability impact only. No known exploits are currently reported in the wild. The root cause is insufficient validation of input parameters in aggregation operations, which can cause the server process to terminate unexpectedly, disrupting database availability.
Potential Impact
For European organizations relying on MongoDB Server for critical applications, this vulnerability poses a risk of service disruption through denial of service attacks. Since MongoDB is widely used in sectors such as finance, healthcare, e-commerce, and public services across Europe, a successful exploitation could interrupt business operations, degrade customer experience, and potentially cause cascading failures in dependent systems. Although the vulnerability does not allow data theft or modification, the loss of availability can have significant operational and reputational consequences. Organizations with multi-tenant environments or exposed database endpoints are particularly at risk. Repeated exploitation could lead to prolonged downtime, impacting compliance with service level agreements and regulatory requirements such as GDPR, which mandates availability and resilience of personal data processing systems.
Mitigation Recommendations
European organizations should promptly upgrade affected MongoDB Server instances to the fixed versions: 6.0.25 or later, 7.0.22 or later, 8.0.12 or later, and 8.1.2 or later. Until patches are applied, organizations should restrict database access strictly to trusted and authenticated users, minimizing the attack surface. Implement network-level controls such as IP whitelisting and VPNs to limit exposure of MongoDB endpoints. Monitor logs for unusual or malformed $group aggregation queries that could indicate attempted exploitation. Employ rate limiting on query submissions to reduce the risk of repeated triggering of the crash. Additionally, review and harden application-level input validation to prevent injection of malicious aggregation parameters. Regularly test backup and recovery procedures to ensure rapid restoration in case of service disruption. Finally, maintain up-to-date inventory of MongoDB deployments and versions to prioritize patching efforts effectively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-10061: CWE-20 Improper Input Validation in MongoDB Inc MongoDB Server
Description
An authorized user can cause a crash in the MongoDB Server through a specially crafted $group query. This vulnerability is related to the incorrect handling of certain accumulator functions when additional parameters are specified within the $group operation. This vulnerability could lead to denial of service if triggered repeatedly. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22, MongoDB Server v8.0 versions prior to 8.0.12 and MongoDB Server v8.1 versions prior to 8.1.2
AI-Powered Analysis
Technical Analysis
CVE-2025-10061 is a medium-severity vulnerability affecting multiple recent versions of MongoDB Server (6.0 prior to 6.0.25, 7.0 prior to 7.0.22, 8.0 prior to 8.0.12, and 8.1 prior to 8.1.2). The issue arises from improper input validation (CWE-20) within the $group aggregation stage of MongoDB queries. Specifically, when an authorized user crafts a $group query that uses certain accumulator functions with additional parameters, the server mishandles these inputs, leading to a crash. This crash results in a denial of service (DoS) condition if the exploit is triggered repeatedly. The vulnerability requires the attacker to have authorized access to the database, but does not require user interaction beyond sending the malicious query. The CVSS 3.1 base score is 6.5, reflecting a network attack vector with low complexity, requiring privileges but no user interaction, and resulting in availability impact only. No known exploits are currently reported in the wild. The root cause is insufficient validation of input parameters in aggregation operations, which can cause the server process to terminate unexpectedly, disrupting database availability.
Potential Impact
For European organizations relying on MongoDB Server for critical applications, this vulnerability poses a risk of service disruption through denial of service attacks. Since MongoDB is widely used in sectors such as finance, healthcare, e-commerce, and public services across Europe, a successful exploitation could interrupt business operations, degrade customer experience, and potentially cause cascading failures in dependent systems. Although the vulnerability does not allow data theft or modification, the loss of availability can have significant operational and reputational consequences. Organizations with multi-tenant environments or exposed database endpoints are particularly at risk. Repeated exploitation could lead to prolonged downtime, impacting compliance with service level agreements and regulatory requirements such as GDPR, which mandates availability and resilience of personal data processing systems.
Mitigation Recommendations
European organizations should promptly upgrade affected MongoDB Server instances to the fixed versions: 6.0.25 or later, 7.0.22 or later, 8.0.12 or later, and 8.1.2 or later. Until patches are applied, organizations should restrict database access strictly to trusted and authenticated users, minimizing the attack surface. Implement network-level controls such as IP whitelisting and VPNs to limit exposure of MongoDB endpoints. Monitor logs for unusual or malformed $group aggregation queries that could indicate attempted exploitation. Employ rate limiting on query submissions to reduce the risk of repeated triggering of the crash. Additionally, review and harden application-level input validation to prevent injection of malicious aggregation parameters. Regularly test backup and recovery procedures to ensure rapid restoration in case of service disruption. Finally, maintain up-to-date inventory of MongoDB deployments and versions to prioritize patching efforts effectively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mongodb
- Date Reserved
- 2025-09-05T20:41:48.167Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb4ec2535f4a97730ec319
Added to database: 9/5/2025, 8:57:38 PM
Last enriched: 9/5/2025, 9:12:46 PM
Last updated: 10/20/2025, 7:49:13 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62697: CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in The Wikimedia Foundation Mediawiki - LanguageSelector Extension
HighCVE-2025-5517: CWE-122 Heap-based Buffer Overflow in ABB Terra AC wallbox (UL40/80A)
MediumCVE-2025-61488: n/a
HighCVE-2025-62698: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - ExternalGuidance
MediumCVE-2025-62700: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - MultiBoilerplate Extensionmaste
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.