Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25609: CWE-862 Missing Authorization in MongoDB Inc MongoDB Server

0
Medium
VulnerabilityCVE-2026-25609cvecve-2026-25609cwe-862
Published: Tue Feb 10 2026 (02/10/2026, 18:39:11 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB Inc
Product: MongoDB Server

Description

Incorrect validation of the profile command may result in the determination that a request altering the 'filter' is read-only.

AI-Powered Analysis

AILast updated: 02/10/2026, 20:16:09 UTC

Technical Analysis

CVE-2026-25609 is a vulnerability classified under CWE-862 (Missing Authorization) affecting MongoDB Server versions 7.0, 8.0, and 8.2. The issue stems from improper validation of the 'profile' command, specifically when a request attempts to alter the 'filter' parameter. The system incorrectly determines such requests to be read-only, bypassing necessary authorization checks. This flaw allows an attacker with low privileges to modify the profiling filter settings without proper authorization. Profiling filters control what database operations are logged for performance and auditing purposes. Unauthorized modification could lead to disabling or altering profiling, thereby obscuring malicious activities or enabling further exploitation. The vulnerability is remotely exploitable over the network without user interaction and does not require elevated privileges beyond low-level access. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the ease of exploitation and limited scope of impact primarily on integrity and confidentiality of profiling data. No patches or known exploits are currently reported, but the vulnerability poses a risk to operational security and forensic capabilities of affected MongoDB deployments.

Potential Impact

For European organizations, this vulnerability could undermine database auditing and monitoring by allowing unauthorized changes to profiling filters. This may hinder detection of malicious activities or performance issues, increasing the risk of prolonged undetected intrusions. Organizations relying on MongoDB for critical applications, including finance, healthcare, and government services, could face increased exposure to insider threats or external attackers exploiting this flaw to conceal their actions. The impact on confidentiality arises from potential exposure of profiling data or enabling attackers to avoid logging. Integrity is affected by unauthorized modification of profiling configurations. Availability is less impacted directly, but operational trust and forensic readiness could degrade. Given the widespread use of MongoDB in Europe, especially in large enterprises and cloud service providers, the vulnerability could have broad implications if exploited.

Mitigation Recommendations

1. Monitor MongoDB server logs for unusual or unauthorized 'profile' command usage, especially changes to the 'filter' parameter. 2. Restrict network access to MongoDB instances using firewalls and VPNs to limit exposure to trusted users only. 3. Implement strict role-based access control (RBAC) policies, ensuring that only authorized administrators can modify profiling settings. 4. Regularly audit user privileges and remove unnecessary low-privilege accounts that could exploit this vulnerability. 5. Apply vendor patches promptly once available; in the absence of patches, consider disabling profiling or restricting its modification until a fix is released. 6. Employ intrusion detection systems (IDS) and security information and event management (SIEM) tools to detect anomalous behavior related to profiling commands. 7. For cloud deployments, leverage provider security controls to isolate and monitor MongoDB instances. 8. Educate database administrators about this vulnerability and best practices for secure MongoDB configuration.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mongodb
Date Reserved
2026-02-03T18:21:58.985Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8e904b57a58fa1272714

Added to database: 2/10/2026, 8:01:20 PM

Last enriched: 2/10/2026, 8:16:09 PM

Last updated: 2/20/2026, 8:56:02 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats