Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11575: CWE-276 Incorrect Default Permissions in MongoDB Atlas SQL ODBC driver

0
High
VulnerabilityCVE-2025-11575cvecve-2025-11575cwe-276
Published: Thu Oct 23 2025 (10/23/2025, 00:22:00 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB
Product: Atlas SQL ODBC driver

Description

Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:37:29 UTC

Technical Analysis

CVE-2025-11575 is a vulnerability identified in the MongoDB Atlas SQL ODBC driver for Windows, specifically versions from 1.0.0 through 2.0.0. The issue arises from incorrect default permissions assigned by the driver during installation or operation, which fall under CWE-276 (Incorrect Default Permissions). These overly permissive settings allow users with low-level privileges on the Windows host to escalate their privileges, potentially gaining administrative or SYSTEM-level access. The vulnerability is local attack vector (AV:L), requiring the attacker to have some level of access already (PR:L), but no user interaction is needed (UI:N). The CVSS 4.0 score is 8.8, indicating a high severity due to the combination of ease of exploitation and the critical impact on confidentiality, integrity, and availability (all rated high). The vulnerability could allow attackers to manipulate or access sensitive data, disrupt database operations, or compromise the host system. Although no public exploits are known at this time, the presence of such a vulnerability in a widely used database connectivity driver poses a significant risk. The driver is commonly used in enterprise environments that integrate MongoDB Atlas with SQL-based applications on Windows, making the scope of affected systems broad. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies.

Potential Impact

The primary impact of CVE-2025-11575 is unauthorized privilege escalation on Windows systems running the vulnerable MongoDB Atlas SQL ODBC driver. This can lead to attackers gaining elevated privileges beyond their initial access level, potentially allowing full control over the host system. Consequences include unauthorized access to sensitive database information, modification or deletion of data, disruption of database services, and the ability to install persistent malware or backdoors. For organizations, this can result in data breaches, operational downtime, regulatory non-compliance, and reputational damage. Since the vulnerability affects a driver used to connect to MongoDB Atlas, environments that rely on this integration for critical business applications are at heightened risk. The vulnerability's exploitation could also serve as a foothold for lateral movement within corporate networks. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency for remediation.

Mitigation Recommendations

Organizations should immediately audit their environments to identify installations of the MongoDB Atlas SQL ODBC driver versions 1.0.0 through 2.0.0 on Windows systems. Until an official patch is released, mitigation steps include: 1) Restricting local user permissions to prevent untrusted users from installing or modifying ODBC drivers; 2) Applying strict file system and registry permissions on driver-related files and configuration to limit access to administrators only; 3) Employing application whitelisting and endpoint detection and response (EDR) solutions to monitor and block unauthorized privilege escalation attempts; 4) Isolating systems running the vulnerable driver from untrusted users and networks; 5) Monitoring Windows event logs and security alerts for suspicious privilege escalation activities; 6) Planning for rapid deployment of patches once available from MongoDB; 7) Educating system administrators about the risk and ensuring secure configuration management practices are followed. These targeted actions go beyond generic advice by focusing on controlling permissions and monitoring specific to the driver’s operational context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mongodb
Date Reserved
2025-10-09T23:13:28.369Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f97a0b93bcde9f320064af

Added to database: 10/23/2025, 12:42:51 AM

Last enriched: 2/27/2026, 4:37:29 AM

Last updated: 3/24/2026, 6:54:39 AM

Views: 331

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses