Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25610: CWE-617 Reachable Assertion in MongoDB Inc MongoDB Server

0
High
VulnerabilityCVE-2026-25610cvecve-2026-25610cwe-617
Published: Tue Feb 10 2026 (02/10/2026, 18:30:40 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB Inc
Product: MongoDB Server

Description

An authorized user may trigger a server crash by running a $geoNear pipeline with certain invalid index hints.

AI-Powered Analysis

AILast updated: 02/10/2026, 19:00:35 UTC

Technical Analysis

CVE-2026-25610 is a vulnerability classified under CWE-617 (Reachable Assertion) found in MongoDB Server versions 7.0 and 8.0. The flaw arises when an authorized user runs a $geoNear aggregation pipeline query with specific invalid index hints, triggering an assertion failure in the server code. This assertion failure leads to a server crash, effectively causing a denial-of-service (DoS) condition. The vulnerability does not require user interaction or elevated privileges beyond being an authorized user, and it can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and no authentication beyond authorization is needed (PR:L). The vulnerability impacts availability severely (VA:H), but does not affect confidentiality or integrity. MongoDB’s $geoNear pipeline is used for geospatial queries, which are common in location-based services. The lack of a patch link suggests that remediation may require vendor updates or configuration workarounds. No known exploits have been reported in the wild, but the high CVSS score (7.1) indicates significant risk if exploited. This vulnerability highlights the importance of validating input parameters in database query pipelines to prevent assertion failures and crashes.

Potential Impact

For European organizations relying on MongoDB Server versions 7.0 or 8.0, this vulnerability poses a significant risk to service availability. Applications using geospatial queries with $geoNear could be targeted by authorized users to cause server crashes, resulting in denial of service. This can disrupt critical business operations, especially in sectors like transportation, logistics, telecommunications, and smart city infrastructure where geospatial data is heavily used. The impact extends to cloud service providers and enterprises hosting MongoDB databases, potentially affecting multi-tenant environments. Although no data breach or integrity compromise is indicated, repeated crashes could lead to operational downtime, loss of customer trust, and financial losses. The vulnerability’s ease of exploitation by authorized users also raises concerns about insider threats or compromised credentials. European organizations with strict uptime and data availability requirements under regulations like GDPR must address this vulnerability promptly to avoid compliance risks related to service interruptions.

Mitigation Recommendations

1. Upgrade MongoDB Server to a patched version once available from the vendor to address CVE-2026-25610. 2. Until patches are released, restrict access to the $geoNear aggregation pipeline by limiting user privileges and roles to only those necessary, minimizing the number of authorized users who can execute such queries. 3. Implement monitoring and alerting for abnormal $geoNear query patterns or frequent assertion failures in MongoDB logs to detect potential exploitation attempts early. 4. Use network segmentation and firewall rules to limit database access to trusted hosts and applications, reducing exposure to potentially malicious authorized users. 5. Conduct regular audits of user roles and permissions to ensure least privilege principles are enforced, particularly for users with access to geospatial query capabilities. 6. Consider disabling or restricting the use of invalid index hints in queries through query validation or application-level input sanitization. 7. Maintain backups and have a robust incident response plan to recover quickly from potential denial-of-service incidents caused by this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mongodb
Date Reserved
2026-02-03T18:21:58.985Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b7cfb4b57a58fa1236d30

Added to database: 2/10/2026, 6:46:19 PM

Last enriched: 2/10/2026, 7:00:35 PM

Last updated: 2/20/2026, 10:14:16 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats