Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4148: CWE-416 Use after free in MongoDB Inc MongoDB Server

0
High
VulnerabilityCVE-2026-4148cvecve-2026-4148cwe-416
Published: Tue Mar 17 2026 (03/17/2026, 15:53:57 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB Inc
Product: MongoDB Server

Description

CVE-2026-4148 is a high-severity use-after-free vulnerability in MongoDB Server versions 7. 0, 8. 0, and 8. 2. It can be exploited by an authenticated user with read role privileges in sharded clusters by issuing a specially crafted $lookup or $graphLookup aggregation pipeline. This vulnerability does not require user interaction or elevated privileges beyond read access but can lead to high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. The vulnerability stems from improper memory management (CWE-416) during aggregation operations in sharded environments. Organizations using affected MongoDB versions in sharded configurations should prioritize patching or mitigating this issue to prevent potential exploitation. The CVSS 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:13:39 UTC

Technical Analysis

CVE-2026-4148 is a use-after-free vulnerability identified in MongoDB Server versions 7.0, 8.0, and 8.2, specifically affecting sharded cluster deployments. The flaw arises when an authenticated user with the read role executes a specially crafted aggregation pipeline using $lookup or $graphLookup stages. These stages perform join-like operations across collections, and the vulnerability occurs due to improper handling of memory references during these operations, leading to use-after-free conditions (CWE-416). Exploiting this vulnerability can allow attackers to cause memory corruption, potentially leading to arbitrary code execution, data leakage, or denial of service. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and only requires privileges equivalent to the read role (PR:L) without user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). No patches or exploit code are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability does not require elevated privileges beyond read access, making it particularly concerning in multi-tenant or shared environments where users have limited roles but access to sharded clusters. The issue highlights the risks associated with complex aggregation operations in distributed database architectures.

Potential Impact

This vulnerability poses a significant risk to organizations using MongoDB sharded clusters, especially those relying on versions 7.0, 8.0, and 8.2. An attacker with read role privileges can exploit this flaw to execute arbitrary code, cause denial of service, or access sensitive data, potentially compromising the confidentiality, integrity, and availability of the database. Given that the attack requires only read-level privileges, insider threats or compromised low-privilege accounts could leverage this vulnerability to escalate their impact. The disruption of database services can affect critical applications relying on MongoDB for data storage, including financial services, healthcare, e-commerce, and cloud service providers. The vulnerability could also be exploited to pivot within an organization's network, increasing the attack surface. Although no known exploits are currently reported in the wild, the high CVSS score and ease of exploitation make it a critical risk that could be weaponized quickly once exploit code becomes available.

Mitigation Recommendations

Organizations should immediately assess their MongoDB deployments to identify if they are running affected versions (7.0, 8.0, 8.2) in sharded cluster configurations. Since no patch links are currently available, administrators should monitor MongoDB vendor advisories for official patches or updates. In the interim, restrict read role access strictly to trusted users and audit all users with read privileges in sharded clusters. Implement network segmentation and access controls to limit exposure of MongoDB instances to untrusted networks. Disable or restrict the use of $lookup and $graphLookup aggregation stages for users who do not require them. Employ runtime monitoring and anomaly detection to identify unusual aggregation queries that could indicate exploitation attempts. Regularly back up data and have incident response plans ready to mitigate potential exploitation consequences. Once patches are released, prioritize their deployment in production environments. Consider upgrading to newer MongoDB versions if they include fixes for this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mongodb
Date Reserved
2026-03-13T17:18:13.718Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b99a3b771bdb1749cb0c92

Added to database: 3/17/2026, 6:15:23 PM

Last enriched: 3/25/2026, 1:13:39 AM

Last updated: 4/29/2026, 5:49:29 AM

Views: 319

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses