Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6707: CWE-863: Incorrect Authorization in MongoDB Inc MongoDB Server

0
Medium
VulnerabilityCVE-2025-6707cvecve-2025-6707cwe-863
Published: Thu Jun 26 2025 (06/26/2025, 14:04:46 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB Inc
Product: MongoDB Server

Description

Under certain conditions, an authenticated user request may execute with stale privileges following an intentional change by an authorized administrator. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.24, MongoDB Server v7.0 version prior to 7.0.21 and MongoDB Server v8.0 version prior to 8.0.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:13:45 UTC

Technical Analysis

CVE-2025-6707 is an authorization vulnerability classified under CWE-863 (Incorrect Authorization) affecting MongoDB Server versions 5.0 prior to 5.0.31, 6.0 prior to 6.0.24, 7.0 prior to 7.0.21, and 8.0 prior to 8.0.5. The vulnerability arises when an authenticated user’s request executes with stale privileges following an intentional privilege change by an authorized administrator. This indicates that the MongoDB Server does not immediately enforce updated privilege changes, allowing users to retain elevated or prior permissions temporarily. The vulnerability requires the attacker to be authenticated with at least low privileges and does not require user interaction, but the attack complexity is high due to the need for specific timing and conditions. The CVSS v3.1 base score is 4.2 (medium), reflecting low confidentiality and integrity impact and no availability impact. The flaw could allow unauthorized data access or modification if exploited, undermining the principle of least privilege. No known exploits have been reported in the wild as of the publication date. The issue affects multiple major MongoDB versions, indicating a broad impact across deployments. MongoDB is widely used in enterprise, cloud, and web applications, making this vulnerability relevant to many organizations. The lack of immediate privilege enforcement could be exploited in environments where privilege changes are frequent or where administrators revoke access to mitigate insider threats or compromised accounts.

Potential Impact

The primary impact of CVE-2025-6707 is the potential for unauthorized access or modification of data due to stale privilege enforcement. Organizations relying on MongoDB for critical applications may face confidentiality breaches if users retain access rights longer than intended. Integrity could also be compromised if users perform unauthorized operations during the window of stale privileges. Although availability is not affected, the risk to data security and compliance is significant, especially in regulated industries. Attackers with authenticated access could exploit this flaw to escalate privileges or bypass recently applied restrictions, increasing the risk of insider threats or lateral movement within networks. The vulnerability affects multiple major MongoDB versions, amplifying its reach globally. Organizations with dynamic user privilege management or frequent administrative changes are particularly vulnerable. Failure to patch could lead to data leaks, unauthorized data manipulation, and potential regulatory penalties.

Mitigation Recommendations

Organizations should immediately upgrade MongoDB Server to the fixed versions: 5.0.31 or later, 6.0.24 or later, 7.0.21 or later, and 8.0.5 or later. Until patches are applied, administrators should minimize privilege changes during active user sessions and consider temporarily disabling non-essential user accounts. Implement monitoring to detect anomalous access patterns that could indicate exploitation attempts. Regularly audit user privileges and session states to ensure that revoked permissions are enforced promptly. Employ network segmentation and strict access controls to limit authenticated user exposure. Consider integrating MongoDB with external identity and access management (IAM) solutions that provide real-time privilege enforcement. Additionally, review and harden MongoDB authentication and authorization configurations to reduce the attack surface. Document and test incident response plans for potential misuse of stale privileges.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mongodb
Date Reserved
2025-06-26T11:09:08.157Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685d570dca1063fb8741f49d

Added to database: 6/26/2025, 2:19:57 PM

Last enriched: 2/27/2026, 4:13:45 AM

Last updated: 3/26/2026, 6:53:58 AM

Views: 128

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses