CVE-2025-13643: CWE-862: Missing Authorization in MongoDB Inc. MongoDB Server
A user with access to the cluster with a limited set of privilege actions may be able to terminate queries that are being executed by other users. This may cause a denial of service by preventing a fraction of queries from successfully completing. This issue affects MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB Server v8.0 versions prior to 8.0.14
AI Analysis
Technical Summary
CVE-2025-13643 identifies a missing authorization vulnerability (CWE-862) in MongoDB Server versions 7.0 prior to 7.0.26 and 8.0 prior to 8.0.14. The flaw allows a user with limited privileges on a MongoDB cluster to terminate queries executed by other users. This occurs because the server does not properly enforce authorization checks on the query termination operation, enabling privilege escalation in terms of operational impact. Although the attacker cannot access or modify data, they can disrupt ongoing queries, causing a denial of service (DoS) effect by preventing some queries from completing successfully. The vulnerability requires network access (AV:N) and low privileges (PR:L), but no user interaction (UI:N). The attack complexity is high (AC:H), meaning exploitation is not trivial but feasible under certain conditions. The scope is unchanged (S:U), affecting only the targeted MongoDB instance. The CVSS v3.1 base score is 3.1, reflecting low severity primarily due to limited impact on availability and no impact on confidentiality or integrity. No public exploits have been reported, indicating limited active exploitation. The vulnerability affects MongoDB Server versions widely used in enterprise environments, making it relevant for organizations relying on MongoDB for critical data processing and analytics workloads. The issue was published on November 25, 2025, and no official patches are linked in the provided data, but MongoDB typically releases updates addressing such vulnerabilities promptly.
Potential Impact
For European organizations, the primary impact of CVE-2025-13643 is potential denial of service caused by unauthorized termination of database queries. This can disrupt business operations that depend on continuous and reliable database access, such as financial services, e-commerce platforms, healthcare systems, and public sector applications. Although the vulnerability does not expose sensitive data or allow data modification, the interruption of query execution can degrade service quality, cause transaction failures, and impact user experience. Organizations with multi-tenant MongoDB deployments or shared clusters are at higher risk, as malicious or compromised users with limited privileges could disrupt other users’ queries. The impact is more pronounced in environments with high query volumes or real-time data processing requirements. Given the low CVSS score and absence of known exploits, the immediate risk is moderate; however, unpatched systems could become targets for opportunistic attackers aiming to cause disruption. The vulnerability also highlights the importance of strict privilege management and monitoring in database environments.
Mitigation Recommendations
To mitigate CVE-2025-13643, European organizations should prioritize upgrading MongoDB Server to versions 7.0.26 or later and 8.0.14 or later once patches are available. In the interim, organizations should audit and minimize user privileges, ensuring that only trusted users have the ability to terminate queries. Implement role-based access control (RBAC) policies that restrict query termination capabilities to administrative roles. Monitor database logs for unusual query termination activities that could indicate exploitation attempts. Employ network segmentation and firewall rules to limit access to MongoDB instances to authorized personnel and systems only. Consider implementing query timeout and retry mechanisms in application logic to reduce the impact of unexpected query terminations. Regularly review MongoDB security advisories and apply security updates promptly. Additionally, conduct penetration testing and vulnerability assessments focused on authorization controls within MongoDB deployments to detect similar weaknesses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-13643: CWE-862: Missing Authorization in MongoDB Inc. MongoDB Server
Description
A user with access to the cluster with a limited set of privilege actions may be able to terminate queries that are being executed by other users. This may cause a denial of service by preventing a fraction of queries from successfully completing. This issue affects MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB Server v8.0 versions prior to 8.0.14
AI-Powered Analysis
Technical Analysis
CVE-2025-13643 identifies a missing authorization vulnerability (CWE-862) in MongoDB Server versions 7.0 prior to 7.0.26 and 8.0 prior to 8.0.14. The flaw allows a user with limited privileges on a MongoDB cluster to terminate queries executed by other users. This occurs because the server does not properly enforce authorization checks on the query termination operation, enabling privilege escalation in terms of operational impact. Although the attacker cannot access or modify data, they can disrupt ongoing queries, causing a denial of service (DoS) effect by preventing some queries from completing successfully. The vulnerability requires network access (AV:N) and low privileges (PR:L), but no user interaction (UI:N). The attack complexity is high (AC:H), meaning exploitation is not trivial but feasible under certain conditions. The scope is unchanged (S:U), affecting only the targeted MongoDB instance. The CVSS v3.1 base score is 3.1, reflecting low severity primarily due to limited impact on availability and no impact on confidentiality or integrity. No public exploits have been reported, indicating limited active exploitation. The vulnerability affects MongoDB Server versions widely used in enterprise environments, making it relevant for organizations relying on MongoDB for critical data processing and analytics workloads. The issue was published on November 25, 2025, and no official patches are linked in the provided data, but MongoDB typically releases updates addressing such vulnerabilities promptly.
Potential Impact
For European organizations, the primary impact of CVE-2025-13643 is potential denial of service caused by unauthorized termination of database queries. This can disrupt business operations that depend on continuous and reliable database access, such as financial services, e-commerce platforms, healthcare systems, and public sector applications. Although the vulnerability does not expose sensitive data or allow data modification, the interruption of query execution can degrade service quality, cause transaction failures, and impact user experience. Organizations with multi-tenant MongoDB deployments or shared clusters are at higher risk, as malicious or compromised users with limited privileges could disrupt other users’ queries. The impact is more pronounced in environments with high query volumes or real-time data processing requirements. Given the low CVSS score and absence of known exploits, the immediate risk is moderate; however, unpatched systems could become targets for opportunistic attackers aiming to cause disruption. The vulnerability also highlights the importance of strict privilege management and monitoring in database environments.
Mitigation Recommendations
To mitigate CVE-2025-13643, European organizations should prioritize upgrading MongoDB Server to versions 7.0.26 or later and 8.0.14 or later once patches are available. In the interim, organizations should audit and minimize user privileges, ensuring that only trusted users have the ability to terminate queries. Implement role-based access control (RBAC) policies that restrict query termination capabilities to administrative roles. Monitor database logs for unusual query termination activities that could indicate exploitation attempts. Employ network segmentation and firewall rules to limit access to MongoDB instances to authorized personnel and systems only. Consider implementing query timeout and retry mechanisms in application logic to reduce the impact of unexpected query terminations. Regularly review MongoDB security advisories and apply security updates promptly. Additionally, conduct penetration testing and vulnerability assessments focused on authorization controls within MongoDB deployments to detect similar weaknesses.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mongodb
- Date Reserved
- 2025-11-25T05:08:50.848Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69253e96441560fe7ee5716c
Added to database: 11/25/2025, 5:28:54 AM
Last enriched: 12/2/2025, 6:23:29 AM
Last updated: 1/10/2026, 10:10:35 PM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.