Jan 1, 2026·5 min read·10 visits
Dubbed 'MongoBleed', this vulnerability mimics the infamous Heartbleed bug. By sending a crafted compressed packet, an unauthenticated attacker can trick the server into treating uninitialized heap memory as valid data. When the parser inevitably chokes on the garbage data, it helpfully echoes it back in an error message, leaking sensitive secrets like admin credentials and session tokens.
A critical, unauthenticated heap memory disclosure vulnerability in MongoDB's wire protocol handling allows attackers to bleed secrets—including passwords and AWS keys—directly from server memory.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N| Product | Affected Versions | Fixed Version |
|---|---|---|
MongoDB Server MongoDB Inc. | 8.2.0 - 8.2.2 | 8.2.3 |
MongoDB Server MongoDB Inc. | 8.0.0 - 8.0.16 | 8.0.17 |
MongoDB Server MongoDB Inc. | 7.0.0 - 7.0.27 | 7.0.28 |
MongoDB Server MongoDB Inc. | 6.0.0 - 6.0.26 | 6.0.27 |
MongoDB Server MongoDB Inc. | 5.0.0 - 5.0.31 | 5.0.32 |
MongoDB Server MongoDB Inc. | 4.4.0 - 4.4.29 | 4.4.30 |
MongoDB Server MongoDB Inc. | 3.6, 4.0, 4.2 | None (EOL) |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-200 (Exposure of Sensitive Information) |
| CVSS v4.0 | 8.7 (High) |
| Attack Vector | Network (Unauthenticated) |
| EPSS Score | 77.17% |
| Exploit Status | Active / Weaponized |
| Component | message_compressor_zlib.cpp |
| Protocol | OP_COMPRESSED (2012) |
The product exposes sensitive information to an unauthorized actor by sending it back in an error message or other response.