Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13643: CWE-862: Missing Authorization in MongoDB Inc. MongoDB Server

0
Low
VulnerabilityCVE-2025-13643cvecve-2025-13643cwe-862
Published: Tue Nov 25 2025 (11/25/2025, 05:16:24 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB Inc.
Product: MongoDB Server

Description

A user with access to the cluster with a limited set of privilege actions may be able to terminate queries that are being executed by other users. This may cause a denial of service by preventing a fraction of queries from successfully completing. This issue affects MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB Server v8.0 versions prior to 8.0.14

AI-Powered Analysis

AILast updated: 12/02/2025, 06:23:29 UTC

Technical Analysis

CVE-2025-13643 identifies a missing authorization vulnerability (CWE-862) in MongoDB Server versions 7.0 prior to 7.0.26 and 8.0 prior to 8.0.14. The flaw allows a user with limited privileges on a MongoDB cluster to terminate queries executed by other users. This occurs because the server does not properly enforce authorization checks on the query termination operation, enabling privilege escalation in terms of operational impact. Although the attacker cannot access or modify data, they can disrupt ongoing queries, causing a denial of service (DoS) effect by preventing some queries from completing successfully. The vulnerability requires network access (AV:N) and low privileges (PR:L), but no user interaction (UI:N). The attack complexity is high (AC:H), meaning exploitation is not trivial but feasible under certain conditions. The scope is unchanged (S:U), affecting only the targeted MongoDB instance. The CVSS v3.1 base score is 3.1, reflecting low severity primarily due to limited impact on availability and no impact on confidentiality or integrity. No public exploits have been reported, indicating limited active exploitation. The vulnerability affects MongoDB Server versions widely used in enterprise environments, making it relevant for organizations relying on MongoDB for critical data processing and analytics workloads. The issue was published on November 25, 2025, and no official patches are linked in the provided data, but MongoDB typically releases updates addressing such vulnerabilities promptly.

Potential Impact

For European organizations, the primary impact of CVE-2025-13643 is potential denial of service caused by unauthorized termination of database queries. This can disrupt business operations that depend on continuous and reliable database access, such as financial services, e-commerce platforms, healthcare systems, and public sector applications. Although the vulnerability does not expose sensitive data or allow data modification, the interruption of query execution can degrade service quality, cause transaction failures, and impact user experience. Organizations with multi-tenant MongoDB deployments or shared clusters are at higher risk, as malicious or compromised users with limited privileges could disrupt other users’ queries. The impact is more pronounced in environments with high query volumes or real-time data processing requirements. Given the low CVSS score and absence of known exploits, the immediate risk is moderate; however, unpatched systems could become targets for opportunistic attackers aiming to cause disruption. The vulnerability also highlights the importance of strict privilege management and monitoring in database environments.

Mitigation Recommendations

To mitigate CVE-2025-13643, European organizations should prioritize upgrading MongoDB Server to versions 7.0.26 or later and 8.0.14 or later once patches are available. In the interim, organizations should audit and minimize user privileges, ensuring that only trusted users have the ability to terminate queries. Implement role-based access control (RBAC) policies that restrict query termination capabilities to administrative roles. Monitor database logs for unusual query termination activities that could indicate exploitation attempts. Employ network segmentation and firewall rules to limit access to MongoDB instances to authorized personnel and systems only. Consider implementing query timeout and retry mechanisms in application logic to reduce the impact of unexpected query terminations. Regularly review MongoDB security advisories and apply security updates promptly. Additionally, conduct penetration testing and vulnerability assessments focused on authorization controls within MongoDB deployments to detect similar weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mongodb
Date Reserved
2025-11-25T05:08:50.848Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69253e96441560fe7ee5716c

Added to database: 11/25/2025, 5:28:54 AM

Last enriched: 12/2/2025, 6:23:29 AM

Last updated: 1/10/2026, 10:10:35 PM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats