PT-2025-52440 · Mongodb+3 · Mongodb Server+4
Alan Coopersmith
·
Published
2025-12-19
·
Updated
2026-04-28
·
CVE-2025-14847
CVSS v4.0
8.7
High
| AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
Name of the Vulnerable Software and Affected Versions
MongoDB versions 3.6 through 8.2.3
Description
MongoDB is vulnerable to a critical remote code execution (RCE) vulnerability (CVE-2025-14847), dubbed "MongoBleed." This flaw stems from improper handling of zlib-compressed protocol headers, allowing unauthenticated attackers to read uninitialized heap memory. This can lead to the leakage of sensitive information, including credentials, API keys, and other secrets. The vulnerability is actively exploited in the wild, with over 87,000 servers potentially affected. A public proof-of-concept (PoC) exploit is available, increasing the risk of widespread exploitation. The vulnerability affects MongoDB versions 3.6 through 8.2.3. Multiple reports indicate active exploitation by threat actors, with some sources suggesting potential data breaches and compromised systems.
Recommendations
MongoDB versions prior to 8.2.3 are vulnerable. Upgrade to version 8.2.3 or later to address this vulnerability. If immediate patching is not possible, disable zlib compression. Implement strict network segmentation to limit exposure. Conduct comprehensive audits of potentially compromised systems. Monitor for unusual unauthenticated traffic.
Exploit
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Linuxmint
Mongodb Server
Mongodb
Red Os
Ubuntu