CVE-2025-11535: CWE-276 Incorrect Default Permissions in MongoDB Inc MongoDB Connector for BI
MongoDB Connector for BI installation via MSI on Windows leaves ACLs unset on custom install directories allows Privilege Escalation.This issue affects MongoDB Connector for BI: from 2.0.0 through 2.14.24.
AI Analysis
Technical Summary
CVE-2025-11535 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting MongoDB Connector for BI versions from 2.0.0 through 2.14.24 when installed via the MSI installer on Windows systems. The core issue arises because the installer does not correctly set Access Control Lists (ACLs) on custom installation directories, leaving them with overly permissive or unset permissions. This misconfiguration enables users with limited privileges on the system to escalate their privileges by modifying files or executables within these directories, potentially gaining administrative or SYSTEM-level access. The vulnerability requires local access with limited privileges but no user interaction, making it easier to exploit in environments where multiple users share the same system or where attackers have gained initial footholds with low privileges. The CVSS 4.0 vector (AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) indicates a local attack vector with low complexity, partial privileges required, no user interaction, and high impact on confidentiality, integrity, and availability, with scope and security requirements also high. No public exploits are known yet, but the vulnerability poses a significant risk due to the potential for privilege escalation and subsequent full system compromise. The issue affects Windows installations of MongoDB Connector for BI, a tool widely used for integrating MongoDB data with business intelligence platforms, making it relevant for enterprises relying on these technologies.
Potential Impact
The primary impact of CVE-2025-11535 is unauthorized privilege escalation on Windows systems running MongoDB Connector for BI. An attacker with limited local privileges can exploit the incorrect ACL settings to gain elevated privileges, potentially SYSTEM or administrative level. This can lead to full system compromise, allowing attackers to install malware, exfiltrate sensitive data, disrupt services, or move laterally within the network. Organizations using this connector in production environments, especially those with multi-user systems or shared environments, face increased risk of insider threats or attackers leveraging initial low-privilege access to escalate control. The vulnerability undermines the confidentiality, integrity, and availability of affected systems and data. Given the critical role of BI connectors in data analytics and decision-making, exploitation could also impact business operations and compliance with data protection regulations.
Mitigation Recommendations
To mitigate CVE-2025-11535, organizations should immediately upgrade MongoDB Connector for BI to a patched version once available from MongoDB Inc. Until patches are released, administrators should manually verify and correct ACLs on custom installation directories to restrict permissions to only necessary system accounts and trusted administrators. Implement strict access controls and monitoring on Windows systems hosting the connector, including auditing file and directory permission changes. Limit local user privileges and avoid granting unnecessary write permissions to installation directories. Employ endpoint detection and response (EDR) tools to detect suspicious privilege escalation attempts. Additionally, consider isolating BI connector hosts from general user environments to reduce exposure. Regularly review and harden Windows security policies and ensure that MSI installations follow best practices for secure directory permissions. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Netherlands, Singapore
CVE-2025-11535: CWE-276 Incorrect Default Permissions in MongoDB Inc MongoDB Connector for BI
Description
MongoDB Connector for BI installation via MSI on Windows leaves ACLs unset on custom install directories allows Privilege Escalation.This issue affects MongoDB Connector for BI: from 2.0.0 through 2.14.24.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11535 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting MongoDB Connector for BI versions from 2.0.0 through 2.14.24 when installed via the MSI installer on Windows systems. The core issue arises because the installer does not correctly set Access Control Lists (ACLs) on custom installation directories, leaving them with overly permissive or unset permissions. This misconfiguration enables users with limited privileges on the system to escalate their privileges by modifying files or executables within these directories, potentially gaining administrative or SYSTEM-level access. The vulnerability requires local access with limited privileges but no user interaction, making it easier to exploit in environments where multiple users share the same system or where attackers have gained initial footholds with low privileges. The CVSS 4.0 vector (AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) indicates a local attack vector with low complexity, partial privileges required, no user interaction, and high impact on confidentiality, integrity, and availability, with scope and security requirements also high. No public exploits are known yet, but the vulnerability poses a significant risk due to the potential for privilege escalation and subsequent full system compromise. The issue affects Windows installations of MongoDB Connector for BI, a tool widely used for integrating MongoDB data with business intelligence platforms, making it relevant for enterprises relying on these technologies.
Potential Impact
The primary impact of CVE-2025-11535 is unauthorized privilege escalation on Windows systems running MongoDB Connector for BI. An attacker with limited local privileges can exploit the incorrect ACL settings to gain elevated privileges, potentially SYSTEM or administrative level. This can lead to full system compromise, allowing attackers to install malware, exfiltrate sensitive data, disrupt services, or move laterally within the network. Organizations using this connector in production environments, especially those with multi-user systems or shared environments, face increased risk of insider threats or attackers leveraging initial low-privilege access to escalate control. The vulnerability undermines the confidentiality, integrity, and availability of affected systems and data. Given the critical role of BI connectors in data analytics and decision-making, exploitation could also impact business operations and compliance with data protection regulations.
Mitigation Recommendations
To mitigate CVE-2025-11535, organizations should immediately upgrade MongoDB Connector for BI to a patched version once available from MongoDB Inc. Until patches are released, administrators should manually verify and correct ACLs on custom installation directories to restrict permissions to only necessary system accounts and trusted administrators. Implement strict access controls and monitoring on Windows systems hosting the connector, including auditing file and directory permission changes. Limit local user privileges and avoid granting unnecessary write permissions to installation directories. Employ endpoint detection and response (EDR) tools to detect suspicious privilege escalation attempts. Additionally, consider isolating BI connector hosts from general user environments to reduce exposure. Regularly review and harden Windows security policies and ensure that MSI installations follow best practices for secure directory permissions. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mongodb
- Date Reserved
- 2025-10-08T21:16:03.837Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e6e35e7a93ff0f450a133a
Added to database: 10/8/2025, 10:19:10 PM
Last enriched: 2/26/2026, 10:13:10 PM
Last updated: 3/26/2026, 9:30:11 AM
Views: 396
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.