Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11535: CWE-276 Incorrect Default Permissions in MongoDB Inc MongoDB Connector for BI

0
High
VulnerabilityCVE-2025-11535cvecve-2025-11535cwe-276
Published: Wed Oct 08 2025 (10/08/2025, 22:07:18 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB Inc
Product: MongoDB Connector for BI

Description

MongoDB Connector for BI installation via MSI on Windows leaves ACLs unset on custom install directories allows Privilege Escalation.This issue affects MongoDB Connector for BI: from 2.0.0 through 2.14.24.

AI-Powered Analysis

AILast updated: 10/16/2025, 01:12:42 UTC

Technical Analysis

CVE-2025-11535 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting MongoDB Connector for BI versions from 2.0.0 through 2.14.24 when installed on Windows systems via MSI installers. The core issue arises because the MSI installation process does not correctly set Access Control Lists (ACLs) on custom installation directories. As a result, these directories inherit permissive or unset ACLs, allowing users with low-level privileges on the system to gain unauthorized access or modify files within the installation path. This misconfiguration can be exploited to escalate privileges locally, potentially allowing an attacker to execute code with higher privileges, alter data, or disrupt service availability. The vulnerability requires an attacker to have local access with low privileges but does not require user interaction, making it a significant risk in environments where multiple users share systems or where attackers have gained limited footholds. The CVSS 4.0 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation given the low privilege requirement and no need for user interaction. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity warrant immediate attention, especially in enterprise environments where MongoDB Connector for BI is deployed for business intelligence operations. The lack of official patches at the time of publication suggests that organizations must apply manual mitigations or monitor for vendor updates closely.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly in sectors relying heavily on MongoDB Connector for BI for data analytics and business intelligence, such as finance, manufacturing, healthcare, and government. Privilege escalation can lead to unauthorized access to sensitive business data, manipulation of analytics results, or disruption of critical reporting functions. This can result in data breaches, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. The vulnerability's exploitation could also serve as a stepping stone for attackers to move laterally within networks, increasing the risk of broader compromise. Organizations with multi-user Windows environments or shared systems are especially vulnerable. The high severity and broad impact on confidentiality, integrity, and availability underscore the critical need for mitigation in European enterprises.

Mitigation Recommendations

1. Immediately review and manually correct ACLs on all custom installation directories used by MongoDB Connector for BI on Windows systems to ensure restrictive permissions are enforced, limiting access to only necessary service accounts and administrators. 2. Restrict local user permissions on Windows hosts running MongoDB Connector for BI to prevent unauthorized modification of installation directories. 3. Implement application whitelisting and endpoint protection to detect and block unauthorized privilege escalation attempts. 4. Monitor system logs and file integrity for suspicious changes in the installation directories. 5. Isolate systems running MongoDB Connector for BI from general user environments to reduce the risk of local privilege escalation. 6. Stay updated with MongoDB Inc. for official patches or updated MSI installers that address this ACL misconfiguration. 7. Consider deploying the connector in containerized or virtualized environments with strict access controls to limit exposure. 8. Conduct regular security audits focusing on file permissions and local privilege escalation vectors on Windows servers hosting MongoDB components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mongodb
Date Reserved
2025-10-08T21:16:03.837Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e6e35e7a93ff0f450a133a

Added to database: 10/8/2025, 10:19:10 PM

Last enriched: 10/16/2025, 1:12:42 AM

Last updated: 11/23/2025, 8:13:44 AM

Views: 266

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats