CVE-2025-13644: CWE-617: Reachable Assertion in MongoDB Inc. MongoDB Server
MongoDB Server may experience an invariant failure during batched delete operations when handling documents. The issue arises when the server mistakenly assumes the presence of multiple documents in a batch based solely on document size exceeding BSONObjMaxSize. This issue affects MongoDB Server v7.0 versions prior to 7.0.26, MongoDB Server v8.0 versions prior to 8.0.13, and MongoDB Server v8.1 versions prior to 8.1.2
AI Analysis
Technical Summary
CVE-2025-13644 is a vulnerability classified under CWE-617 (Reachable Assertion) affecting MongoDB Server versions 7.0 prior to 7.0.26, 8.0 prior to 8.0.13, and 8.1 prior to 8.1.2. The issue arises during batched delete operations where the server incorrectly assumes the presence of multiple documents in a batch based solely on the size of a document exceeding BSONObjMaxSize, the maximum BSON object size. This incorrect assumption leads to an invariant failure, triggering an assertion that causes the MongoDB server process to crash, resulting in a denial of service (DoS) condition. The vulnerability does not affect confidentiality or integrity but impacts availability. The CVSS v3.1 score is 6.5 (medium), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and a scope limited to the vulnerable component. No known exploits have been reported in the wild as of the publication date. The vulnerability is significant for environments where MongoDB is used for critical data operations, as unexpected crashes can disrupt services and lead to downtime. The root cause is a logic flaw in handling batch deletes, specifically in the server's internal validation of document batches based on size rather than actual document count. This flaw can be triggered remotely by an attacker with low privileges who can send crafted delete requests. MongoDB Inc. has released patches in versions 7.0.26, 8.0.13, and 8.1.2 to address this issue, but no direct patch links were provided in the source information.
Potential Impact
For European organizations, the primary impact of CVE-2025-13644 is denial of service due to server crashes during batched delete operations in MongoDB. This can lead to unplanned downtime, disruption of business-critical applications, and potential loss of availability for services relying on MongoDB databases. Sectors such as finance, healthcare, telecommunications, and government agencies that depend heavily on MongoDB for real-time data processing and storage may experience operational interruptions. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect service level agreements (SLAs), customer trust, and regulatory compliance, especially under GDPR mandates that require maintaining service continuity and data availability. Additionally, recovery from crashes may require manual intervention and could increase operational costs. The requirement of low privileges for exploitation means insider threats or compromised accounts could trigger the vulnerability, increasing risk within internal networks. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
European organizations should prioritize upgrading MongoDB Server to the fixed versions 7.0.26, 8.0.13, or 8.1.2 as soon as possible to eliminate this vulnerability. Until patches are applied, organizations should implement strict access controls to limit who can perform batched delete operations, ideally restricting this capability to trusted administrators only. Network segmentation and firewall rules should be enforced to restrict access to MongoDB instances, minimizing exposure to potentially malicious actors. Monitoring and alerting should be enhanced to detect abnormal batched delete requests or server crashes indicative of exploitation attempts. Additionally, organizations should review and harden their MongoDB configurations, disabling unnecessary features and enabling audit logging to track delete operations. Regular backups and tested recovery procedures are essential to minimize downtime in case of crashes. Finally, educating internal teams about the risk and signs of exploitation can improve incident response readiness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-13644: CWE-617: Reachable Assertion in MongoDB Inc. MongoDB Server
Description
MongoDB Server may experience an invariant failure during batched delete operations when handling documents. The issue arises when the server mistakenly assumes the presence of multiple documents in a batch based solely on document size exceeding BSONObjMaxSize. This issue affects MongoDB Server v7.0 versions prior to 7.0.26, MongoDB Server v8.0 versions prior to 8.0.13, and MongoDB Server v8.1 versions prior to 8.1.2
AI-Powered Analysis
Technical Analysis
CVE-2025-13644 is a vulnerability classified under CWE-617 (Reachable Assertion) affecting MongoDB Server versions 7.0 prior to 7.0.26, 8.0 prior to 8.0.13, and 8.1 prior to 8.1.2. The issue arises during batched delete operations where the server incorrectly assumes the presence of multiple documents in a batch based solely on the size of a document exceeding BSONObjMaxSize, the maximum BSON object size. This incorrect assumption leads to an invariant failure, triggering an assertion that causes the MongoDB server process to crash, resulting in a denial of service (DoS) condition. The vulnerability does not affect confidentiality or integrity but impacts availability. The CVSS v3.1 score is 6.5 (medium), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and a scope limited to the vulnerable component. No known exploits have been reported in the wild as of the publication date. The vulnerability is significant for environments where MongoDB is used for critical data operations, as unexpected crashes can disrupt services and lead to downtime. The root cause is a logic flaw in handling batch deletes, specifically in the server's internal validation of document batches based on size rather than actual document count. This flaw can be triggered remotely by an attacker with low privileges who can send crafted delete requests. MongoDB Inc. has released patches in versions 7.0.26, 8.0.13, and 8.1.2 to address this issue, but no direct patch links were provided in the source information.
Potential Impact
For European organizations, the primary impact of CVE-2025-13644 is denial of service due to server crashes during batched delete operations in MongoDB. This can lead to unplanned downtime, disruption of business-critical applications, and potential loss of availability for services relying on MongoDB databases. Sectors such as finance, healthcare, telecommunications, and government agencies that depend heavily on MongoDB for real-time data processing and storage may experience operational interruptions. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect service level agreements (SLAs), customer trust, and regulatory compliance, especially under GDPR mandates that require maintaining service continuity and data availability. Additionally, recovery from crashes may require manual intervention and could increase operational costs. The requirement of low privileges for exploitation means insider threats or compromised accounts could trigger the vulnerability, increasing risk within internal networks. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
European organizations should prioritize upgrading MongoDB Server to the fixed versions 7.0.26, 8.0.13, or 8.1.2 as soon as possible to eliminate this vulnerability. Until patches are applied, organizations should implement strict access controls to limit who can perform batched delete operations, ideally restricting this capability to trusted administrators only. Network segmentation and firewall rules should be enforced to restrict access to MongoDB instances, minimizing exposure to potentially malicious actors. Monitoring and alerting should be enhanced to detect abnormal batched delete requests or server crashes indicative of exploitation attempts. Additionally, organizations should review and harden their MongoDB configurations, disabling unnecessary features and enabling audit logging to track delete operations. Regular backups and tested recovery procedures are essential to minimize downtime in case of crashes. Finally, educating internal teams about the risk and signs of exploitation can improve incident response readiness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mongodb
- Date Reserved
- 2025-11-25T05:17:22.910Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6925421a441560fe7ee98db4
Added to database: 11/25/2025, 5:43:54 AM
Last enriched: 12/2/2025, 6:23:43 AM
Last updated: 1/10/2026, 10:13:16 PM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.