Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11695: CWE-295: Improper Certificate Validation in MongoDB Rust Driver

0
High
VulnerabilityCVE-2025-11695cvecve-2025-11695cwe-295
Published: Mon Oct 13 2025 (10/13/2025, 16:22:57 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB
Product: Rust Driver

Description

When tlsInsecure=False appears in a connection string, certificate validation is disabled. This vulnerability affects MongoDB Rust Driver versions prior to v3.2.5

AI-Powered Analysis

AILast updated: 10/21/2025, 00:47:20 UTC

Technical Analysis

CVE-2025-11695 is a vulnerability classified under CWE-295 (Improper Certificate Validation) found in the MongoDB Rust Driver versions prior to 3.2.5. The issue arises when the connection string parameter tlsInsecure=False is used, which disables TLS certificate validation. This misconfiguration allows attackers to perform man-in-the-middle (MITM) attacks by intercepting and potentially altering the communication between the client application and the MongoDB server. The vulnerability impacts the confidentiality and integrity of data transmitted over the network, as attackers can impersonate the database server or intercept sensitive information. The CVSS v3.1 score of 8.0 indicates a high severity, with the vector showing network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:R), and scope changed (S:C). The vulnerability does not affect availability. No public exploits have been reported yet, but the risk remains significant due to the nature of the flaw. The root cause is the improper handling of TLS validation flags in the Rust Driver, which should enforce certificate validation by default to prevent MITM attacks. MongoDB has addressed this issue in version 3.2.5 by ensuring proper certificate validation regardless of the tlsInsecure parameter. Organizations using the affected driver versions with tlsInsecure=False are advised to upgrade and review their connection configurations to maintain secure communications.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of data exchanged with MongoDB databases via the Rust Driver. Attackers exploiting this flaw can intercept sensitive information such as credentials, personal data, or proprietary business information, leading to data breaches and compliance violations under GDPR. The integrity of data can also be compromised, potentially resulting in unauthorized data manipulation or injection attacks. Given the increasing adoption of Rust in backend development and MongoDB’s popularity as a NoSQL database, many European enterprises, especially in finance, healthcare, and technology sectors, could be affected. The vulnerability's requirement for user interaction and high attack complexity somewhat limits exploitation but does not eliminate the risk, particularly in targeted attacks or supply chain compromises. Disruption to business operations is possible if trust in data integrity is lost. Additionally, regulatory repercussions and reputational damage could be severe for organizations failing to address this vulnerability promptly.

Mitigation Recommendations

1. Upgrade the MongoDB Rust Driver to version 3.2.5 or later, where the vulnerability is fixed. 2. Avoid using the tlsInsecure=False parameter in connection strings, especially in production environments. 3. Enforce strict TLS certificate validation policies within application configurations and infrastructure. 4. Implement network-level protections such as TLS interception detection and anomaly-based intrusion detection systems to identify potential MITM attempts. 5. Conduct regular security audits and code reviews focusing on TLS configurations and dependencies. 6. Educate developers and DevOps teams about the risks of disabling certificate validation and best practices for secure database connections. 7. Monitor logs for unusual connection patterns or certificate errors that might indicate exploitation attempts. 8. Consider using certificate pinning or mutual TLS authentication where feasible to strengthen trust in database connections.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mongodb
Date Reserved
2025-10-13T16:15:52.158Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed30c839004152d7ef8a27

Added to database: 10/13/2025, 5:03:04 PM

Last enriched: 10/21/2025, 12:47:20 AM

Last updated: 12/3/2025, 1:12:58 AM

Views: 290

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats