Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29793: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in @feathersjs mongodb

0
Critical
VulnerabilityCVE-2026-29793cvecve-2026-29793cwe-943
Published: Tue Mar 10 2026 (03/10/2026, 20:08:52 UTC)
Source: CVE Database V5
Vendor/Project: @feathersjs
Product: mongodb

Description

Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, Socket.IO clients can send arbitrary JavaScript objects as the id argument to any service method (get, patch, update, remove). The transport layer performs no type checking on this argument. When the service uses the MongoDB adapter, these objects pass through getObjectId() and land directly in the MongoDB query as operators. Sending {$ne: null} as the id matches every document in the collection. This vulnerability is fixed in 5.0.42.

AI-Powered Analysis

AILast updated: 03/11/2026, 14:44:14 UTC

Technical Analysis

The vulnerability CVE-2026-29793 affects the @feathersjs framework, a popular tool for building web APIs and real-time applications using JavaScript or TypeScript. Specifically, versions from 5.0.0 up to but not including 5.0.42 are vulnerable when the framework is used with the MongoDB adapter. The root cause is that Socket.IO clients can send arbitrary JavaScript objects as the id argument to service methods such as get, patch, update, and remove. The transport layer does not enforce type checking on this id parameter. When the MongoDB adapter processes this id, it passes through a function called getObjectId() which fails to sanitize or validate the input properly. As a result, maliciously crafted objects containing MongoDB query operators (e.g., {$ne: null}) are injected directly into the database query. This allows attackers to manipulate queries to match all documents or perform unauthorized operations on the database. The vulnerability is categorized under CWE-943, indicating improper neutralization of special elements in data query logic. Exploitation requires no authentication or user interaction, making it trivially exploitable remotely. The CVSS 4.0 score is 9.3 (critical), reflecting the high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a severe risk to any organization using affected versions of Feathersjs with MongoDB. The issue was publicly disclosed on March 10, 2026, and fixed in version 5.0.42.

Potential Impact

This vulnerability can have devastating consequences for organizations worldwide that use the @feathersjs framework with MongoDB. Attackers can bypass access controls and execute arbitrary queries that affect all documents in a collection, leading to unauthorized data disclosure, modification, or deletion. This compromises data confidentiality, integrity, and availability simultaneously. Because no authentication or user interaction is required, attackers can remotely exploit this flaw at scale, potentially affecting multiple services and applications. The impact is especially severe for organizations relying on Feathersjs for critical APIs or real-time applications handling sensitive or regulated data. Data breaches, service disruptions, and loss of customer trust are likely outcomes. Additionally, attackers could leverage this vulnerability as a foothold for further lateral movement or persistence within affected environments. The lack of known exploits in the wild does not diminish the urgency, as the vulnerability is straightforward to exploit and publicly documented.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade the @feathersjs framework to version 5.0.42 or later, where the issue is fixed. If upgrading is not immediately feasible, implement strict input validation and sanitization on the id parameter at the application layer to reject any non-string or non-ObjectId inputs, especially those containing MongoDB operators. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious query patterns such as {$ne: null} in requests. Restrict network access to the affected services to trusted clients only and monitor logs for anomalous queries or unexpected mass data access patterns. Conduct thorough code reviews and penetration testing focusing on injection flaws in data query logic. Finally, maintain an inventory of all applications using Feathersjs with MongoDB to ensure no vulnerable instances remain in production or development environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T16:26:02.900Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b17c642f860ef943f8b128

Added to database: 3/11/2026, 2:29:56 PM

Last enriched: 3/11/2026, 2:44:14 PM

Last updated: 3/14/2026, 1:14:45 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses