Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2303: CWE-183 Permissive List of Allowed Inputs in MongoDB Inc MongoDB Go Driver

0
Medium
VulnerabilityCVE-2026-2303cvecve-2026-2303cwe-183
Published: Tue Feb 10 2026 (02/10/2026, 19:03:06 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB Inc
Product: MongoDB Go Driver

Description

The mongo-go-driver repository contains CGo bindings for GSSAPI (Kerberos) authentication on Linux and macOS. The C wrapper implementation contains a heap out-of-bounds read vulnerability due to incorrect assumptions about string termination in the GSSAPI standard. Since GSSAPI buffers are not guaranteed to be null-terminated or have extra padding, this results in reading one byte past the allocated heap buffer.

AI-Powered Analysis

AILast updated: 02/18/2026, 10:05:28 UTC

Technical Analysis

CVE-2026-2303 is a vulnerability identified in the MongoDB Go Driver, specifically in its CGo bindings that implement GSSAPI (Kerberos) authentication on Linux and macOS platforms. The root cause is a heap out-of-bounds read triggered by incorrect assumptions about string termination within the GSSAPI standard. Unlike typical C strings, GSSAPI buffers are not guaranteed to be null-terminated or padded, but the vulnerable code assumes they are, leading to reading one byte beyond the allocated heap buffer. This flaw is categorized under CWE-183 (Permissive List of Allowed Inputs) and can cause the application to read unintended memory, potentially leaking sensitive information or causing application crashes. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with attack vector as network, low attack complexity, no privileges required, but user interaction needed. The impact on confidentiality is high due to possible information disclosure, while integrity and availability impacts are none or minimal. No known exploits have been reported, and no patches are currently linked, so mitigation relies on careful input validation and monitoring. The vulnerability affects MongoDB Go Driver versions 1.0.0 and 2.0.0, which are used in applications that rely on Kerberos authentication for secure access to MongoDB databases. Since Kerberos is widely used in enterprise environments, especially in Linux and macOS deployments, this vulnerability could affect a broad range of applications that integrate MongoDB with Go-based services.

Potential Impact

For European organizations, the impact of CVE-2026-2303 can be significant in environments where MongoDB Go Driver is used with Kerberos authentication on Linux or macOS. The heap out-of-bounds read can lead to unintended memory disclosure, potentially exposing sensitive authentication tokens or other confidential data. This could facilitate further attacks such as credential theft or lateral movement within networks. Although the vulnerability does not allow direct code execution or privilege escalation, the confidentiality impact is high, which is critical for compliance with GDPR and other data protection regulations in Europe. Additionally, application instability or crashes caused by this vulnerability could disrupt business operations. Organizations in sectors with high security requirements, such as finance, healthcare, and government, are particularly at risk. The requirement for user interaction and low privileges reduces the attack surface somewhat, but the network attack vector means remote exploitation is possible if user interaction can be induced. Overall, the vulnerability poses a moderate risk that must be addressed to maintain secure authentication and data confidentiality.

Mitigation Recommendations

To mitigate CVE-2026-2303, European organizations should: 1) Monitor MongoDB Go Driver usage and identify applications using versions 1.0.0 or 2.0.0 with Kerberos authentication on Linux/macOS. 2) Apply vendor patches immediately once available; if no patches exist, consider upgrading to a newer driver version that addresses this issue. 3) Implement strict input validation and sanitization around GSSAPI authentication data to prevent malformed buffers. 4) Employ runtime memory protection tools such as AddressSanitizer or similar to detect out-of-bounds reads during testing and staging. 5) Restrict network access to MongoDB services requiring Kerberos authentication to trusted hosts and networks, reducing exposure. 6) Educate users to avoid unsolicited interactions that could trigger the vulnerability. 7) Enable detailed logging and monitoring of authentication failures or unusual memory access patterns to detect exploitation attempts. 8) Consider isolating critical MongoDB instances in hardened environments with limited user interaction. These steps go beyond generic advice by focusing on the specific nature of the vulnerability and the environment in which it occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mongodb
Date Reserved
2026-02-10T18:55:27.871Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8b0c4b57a58fa12667cf

Added to database: 2/10/2026, 7:46:20 PM

Last enriched: 2/18/2026, 10:05:28 AM

Last updated: 2/21/2026, 12:21:38 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats