Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2302: 183 in MongoDB Inc MongoDB Ruby Driver

0
Medium
VulnerabilityCVE-2026-2302cvecve-2026-2302
Published: Tue Feb 10 2026 (02/10/2026, 18:59:23 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB Inc
Product: MongoDB Ruby Driver

Description

Under specific conditions when processing a maliciously crafted value of type Hash r, Mongoid::Criteria.from_hash may allow for executing arbitrary Ruby code.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 23:08:20 UTC

Technical Analysis

CVE-2026-2302 is a vulnerability identified in the MongoDB Ruby Driver, specifically impacting versions 7.0.0, 8.0.0, 8.1.0, and 9.0.0. The flaw exists in the Mongoid::Criteria.from_hash method, which under certain conditions processes a maliciously crafted Hash r value. This processing flaw can lead to the execution of arbitrary Ruby code, effectively allowing an attacker to run code within the context of the application using the driver. The vulnerability is classified under CWE-183, which relates to the improper handling of data structures leading to code injection. Exploitation requires network access and low attack complexity but does require privileges and user interaction, indicating that an attacker must have some level of access or trick a user into triggering the vulnerability. The CVSS 4.0 vector indicates no confidentiality impact but high integrity impact, with no availability or scope changes. No known exploits have been reported in the wild, and no official patches have been linked yet, suggesting that remediation may require vendor updates or workarounds. This vulnerability is particularly critical for applications that accept user input and pass it to Mongoid::Criteria.from_hash without proper sanitization or validation, as it could lead to remote code execution and compromise of the host system.

Potential Impact

The primary impact of CVE-2026-2302 is the potential for arbitrary code execution within applications using the vulnerable MongoDB Ruby Driver versions. This can lead to a full compromise of the application environment, allowing attackers to manipulate data, escalate privileges, or pivot to other systems. The integrity of data stored or processed by the application can be severely affected, and while confidentiality impact is rated none, attackers could still exfiltrate data by executing code. Availability is not directly impacted, but secondary effects such as system instability or destruction of data could occur. Organizations relying on the MongoDB Ruby Driver in production environments, especially those exposing APIs or web interfaces to untrusted users, face increased risk. The lack of known exploits in the wild currently reduces immediate threat, but the presence of a public CVE and medium severity score means attackers may develop exploits soon. This vulnerability could be leveraged in targeted attacks against software development companies, SaaS providers, and enterprises using Ruby-based applications with MongoDB backends.

Mitigation Recommendations

To mitigate CVE-2026-2302, organizations should first avoid passing untrusted or unsanitized input to the Mongoid::Criteria.from_hash method. Implement strict input validation and sanitization routines to ensure that only expected data structures are processed. Employ the principle of least privilege by limiting the permissions of the application and database users to reduce the impact of potential exploitation. Monitor application logs and behavior for unusual activity that could indicate exploitation attempts. Stay informed about vendor updates and apply patches promptly once available. If patches are not yet released, consider implementing application-level workarounds such as disabling or restricting the use of from_hash in contexts where input cannot be fully trusted. Conduct code reviews and security testing focused on areas interacting with Mongoid criteria construction. Additionally, use runtime application self-protection (RASP) or web application firewalls (WAFs) configured to detect and block suspicious payloads targeting Ruby code injection. Finally, educate developers about secure coding practices related to deserialization and dynamic code execution in Ruby.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mongodb
Date Reserved
2026-02-10T18:55:25.485Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8b0e4b57a58fa1266823

Added to database: 2/10/2026, 7:46:22 PM

Last enriched: 2/27/2026, 11:08:20 PM

Last updated: 4/7/2026, 1:36:18 AM

Views: 169

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses