Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

Posted on December 27, 2025December 27, 2025 By CWS

Dec 27, 2025Ravie LakshmananDatabase Safety / Vulnerability
A high-severity safety flaw has been disclosed in MongoDB that would enable unauthenticated customers to learn uninitialized heap reminiscence.
The vulnerability, tracked as CVE-2025-14847 (CVSS rating: 8.7), has been described as a case of improper dealing with of size parameter inconsistency, which arises when a program fails to appropriately deal with situations the place a size subject is inconsistent with the precise size of the related knowledge.
“Mismatched size fields in Zlib compressed protocol headers could enable a learn of uninitialized heap reminiscence by an unauthenticated consumer,” based on an outline of the flaw in CVE.org.

The flaw impacts the next variations of the database –

MongoDB 8.2.0 by means of 8.2.3
MongoDB 8.0.0 by means of 8.0.16
MongoDB 7.0.0 by means of 7.0.26
MongoDB 6.0.0 by means of 6.0.26
MongoDB 5.0.0 by means of 5.0.31
MongoDB 4.4.0 by means of 4.4.29
All MongoDB Server v4.2 variations
All MongoDB Server v4.0 variations
All MongoDB Server v3.6 variations

The problem has been addressed in MongoDB variations 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, and 4.4.30.
“An client-side exploit of the Server’s zlib implementation can return uninitialized heap reminiscence with out authenticating to the server,” MongoDB stated. “We strongly suggest upgrading to a set model as quickly as doable.”

If rapid replace shouldn’t be an possibility, it is really helpful to disable zlib compression on the MongoDB Server by beginning mongod or mongos with a networkMessageCompressors or a web.compression.compressors possibility that explicitly omits zlib. The opposite compressor choices supported by MongoDB are snappy and zstd.
“CVE-2025-14847 permits a distant, unauthenticated attacker to set off a situation through which the MongoDB server could return uninitialized reminiscence from its heap,” OP Innovate stated. “This might end result within the disclosure of delicate in-memory knowledge, together with inner state info, pointers, or different knowledge that will help an attacker in additional exploitation.”

The Hacker News Tags:Attackers, Flaw, Lets, Memory, MongoDB, Read, Unauthenticated, Uninitialized

Post navigation

Previous Post: TeamViewer DEX Vulnerabilities Let Attackers Trigger DoS Attack and Expose Sensitive Data
Next Post: Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data

Related Posts

U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure The Hacker News
Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android The Hacker News
Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances The Hacker News
Interlock Ransomware Exploits Cisco Flaw for Root Access Interlock Ransomware Exploits Cisco Flaw for Root Access The Hacker News
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts The Hacker News
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark