Key Takeaways
A critical MongoDB vulnerability has been disclosed that allows an unauthenticated remote attacker to access and read uninitialized memory on a vulnerable MongoDB server. This type of flaw can expose sensitive data fragments that may have been previously processed and are still present in the server's memory.
“A client-side exploit of the Server's zlib implementation can return uninitialized heap memory without authenticating to the server,” a MongoDB advisory reads. The vulnerability, tracked as CVE-2025-14847 (aka MongoBleed), stems from an issue in how the popular NoSQL database handles specific types of queries or commands.
An attacker can craft a malicious request that causes the server to return a response containing data from uninitialized heap memory. Because this action does not require authentication, any exposed MongoDB instance is a potential target.
An Elastic Security employee posted a proof-of-concept (PoC) exploit on GitHub, and Cybersecurity expert Kevin Beaumont validated it, stating that it harvests in-memory data such as:
The exploit does not allow for direct control over which memory is read, but an attacker can repeatedly query the server to collect a significant amount of data fragments over time. This information can then be pieced together to reconstruct sensitive information.
This issue affects MongoDB versions:
According to Wiz, which validated many internet-facing instances as exploitable, “42% of cloud environments have at least one instance of MongoDB in a version vulnerable to CVE-2025-14847, including both publicly exposed and internal resources,” and Censys has reported observing 87,000 potentially vulnerable instances worldwide.
In response to the discovery, MongoDB has released security patches, and administrators are strongly advised to immediately apply them to all affected MongoDB instances and upgrade to 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, or 4.4.30.
“If you cannot upgrade immediately, disable zlib compression on the MongoDB Server by starting mongod or mongos with a ‘networkMessageCompressors’ or a ‘net.compression.compressors’ option that explicitly omits zlib. Example safe values include snappy,zstd or disabled,” the advisory reads.
Last week, novice researchers were targeted via GitHub repositories containing fake PoC exploits for legitimate vulnerabilities.