CVE-2026-1849: CWE-674 Uncontrolled Recursion in MongoDB Inc MongoDB Server
MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce deeply nested documents. The issue arises in recursive functions because the server does not periodically check the depth of the expression.
AI Analysis
Technical Summary
CVE-2026-1849 is a vulnerability identified in MongoDB Server versions 7.0, 8.0, and 8.2, categorized under CWE-674 (Uncontrolled Recursion). The issue stems from the server's recursive functions used to evaluate expressions that produce deeply nested documents. Specifically, the server fails to periodically check or limit the recursion depth during expression evaluation, which can cause the server to consume excessive memory resources. This uncontrolled recursion can lead to out-of-memory (OOM) failures, effectively causing a denial of service (DoS) condition by crashing or severely degrading the database server's availability. The vulnerability does not require user interaction and can be triggered remotely over the network by an attacker with at least low privileges (PR:L) on the database server, as indicated by the CVSS vector. The CVSS v4.0 base score is 7.1, reflecting a high severity due to the impact on availability and the ease of exploitation without authentication barriers. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. However, the vulnerability poses a significant risk to MongoDB deployments, especially those processing complex queries or untrusted input that could be crafted to induce deep recursion. The lack of recursion depth checks is a design oversight that could be exploited to disrupt service continuity. Organizations using affected MongoDB versions should be aware of this risk and prepare to apply vendor patches once released.
Potential Impact
The primary impact of CVE-2026-1849 is on the availability of MongoDB Server instances. An attacker can craft queries or expressions that cause the server to enter uncontrolled recursion, leading to excessive memory consumption and out-of-memory failures. This results in denial of service, potentially crashing the database or severely degrading its performance. For European organizations, especially those relying on MongoDB for critical applications such as financial services, healthcare, government databases, and e-commerce platforms, this vulnerability could disrupt business operations, cause data unavailability, and impact service-level agreements. Additionally, if exploited in multi-tenant environments or cloud-hosted MongoDB instances, the impact could extend to multiple customers. The vulnerability does not directly compromise confidentiality or integrity but can indirectly affect these by causing system instability. The ease of exploitation without user interaction and the lack of authentication requirements increase the risk of automated or targeted attacks. Organizations with high MongoDB usage and complex query workloads are particularly vulnerable to service disruption.
Mitigation Recommendations
1. Monitor MongoDB query logs for unusually deep or complex nested document expressions that could indicate attempts to exploit uncontrolled recursion. 2. Implement strict access controls and least privilege principles to limit which users can execute complex queries or expressions. 3. Use MongoDB's built-in resource limits and query execution timeouts to prevent runaway queries from consuming excessive memory. 4. Deploy application-level input validation to prevent untrusted or malformed input from triggering deep recursion in database queries. 5. Stay informed about MongoDB vendor advisories and apply security patches promptly once they become available for affected versions 7.0, 8.0, and 8.2. 6. Consider upgrading to newer MongoDB versions if they include fixes or improved recursion depth checks. 7. In cloud or managed environments, coordinate with service providers to ensure they have mitigations in place. 8. Conduct regular stress and fuzz testing of database queries to identify potential recursion-related issues proactively. 9. Isolate critical MongoDB instances and implement redundancy and failover mechanisms to minimize downtime in case of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2026-1849: CWE-674 Uncontrolled Recursion in MongoDB Inc MongoDB Server
Description
MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce deeply nested documents. The issue arises in recursive functions because the server does not periodically check the depth of the expression.
AI-Powered Analysis
Technical Analysis
CVE-2026-1849 is a vulnerability identified in MongoDB Server versions 7.0, 8.0, and 8.2, categorized under CWE-674 (Uncontrolled Recursion). The issue stems from the server's recursive functions used to evaluate expressions that produce deeply nested documents. Specifically, the server fails to periodically check or limit the recursion depth during expression evaluation, which can cause the server to consume excessive memory resources. This uncontrolled recursion can lead to out-of-memory (OOM) failures, effectively causing a denial of service (DoS) condition by crashing or severely degrading the database server's availability. The vulnerability does not require user interaction and can be triggered remotely over the network by an attacker with at least low privileges (PR:L) on the database server, as indicated by the CVSS vector. The CVSS v4.0 base score is 7.1, reflecting a high severity due to the impact on availability and the ease of exploitation without authentication barriers. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. However, the vulnerability poses a significant risk to MongoDB deployments, especially those processing complex queries or untrusted input that could be crafted to induce deep recursion. The lack of recursion depth checks is a design oversight that could be exploited to disrupt service continuity. Organizations using affected MongoDB versions should be aware of this risk and prepare to apply vendor patches once released.
Potential Impact
The primary impact of CVE-2026-1849 is on the availability of MongoDB Server instances. An attacker can craft queries or expressions that cause the server to enter uncontrolled recursion, leading to excessive memory consumption and out-of-memory failures. This results in denial of service, potentially crashing the database or severely degrading its performance. For European organizations, especially those relying on MongoDB for critical applications such as financial services, healthcare, government databases, and e-commerce platforms, this vulnerability could disrupt business operations, cause data unavailability, and impact service-level agreements. Additionally, if exploited in multi-tenant environments or cloud-hosted MongoDB instances, the impact could extend to multiple customers. The vulnerability does not directly compromise confidentiality or integrity but can indirectly affect these by causing system instability. The ease of exploitation without user interaction and the lack of authentication requirements increase the risk of automated or targeted attacks. Organizations with high MongoDB usage and complex query workloads are particularly vulnerable to service disruption.
Mitigation Recommendations
1. Monitor MongoDB query logs for unusually deep or complex nested document expressions that could indicate attempts to exploit uncontrolled recursion. 2. Implement strict access controls and least privilege principles to limit which users can execute complex queries or expressions. 3. Use MongoDB's built-in resource limits and query execution timeouts to prevent runaway queries from consuming excessive memory. 4. Deploy application-level input validation to prevent untrusted or malformed input from triggering deep recursion in database queries. 5. Stay informed about MongoDB vendor advisories and apply security patches promptly once they become available for affected versions 7.0, 8.0, and 8.2. 6. Consider upgrading to newer MongoDB versions if they include fixes or improved recursion depth checks. 7. In cloud or managed environments, coordinate with service providers to ensure they have mitigations in place. 8. Conduct regular stress and fuzz testing of database queries to identify potential recursion-related issues proactively. 9. Isolate critical MongoDB instances and implement redundancy and failover mechanisms to minimize downtime in case of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mongodb
- Date Reserved
- 2026-02-03T18:21:52.859Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698b8b0c4b57a58fa12667d2
Added to database: 2/10/2026, 7:46:20 PM
Last enriched: 2/10/2026, 8:01:42 PM
Last updated: 2/21/2026, 12:18:09 AM
Views: 116
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.