A critical MongoDB vulnerability has been disclosed that allows an unauthenticated remote attacker to access and read uninitialized memory on a vulnerable MongoDB server. This type of flaw can expose sensitive data fragments that may have been previously processed and are still present in the server's memory.
“A client-side exploit of the Server's zlib implementation can return uninitialized heap memory without authenticating to the server,” a MongoDB advisory reads. The vulnerability, tracked as CVE-2025-14847 (aka MongoBleed), stems from an issue in how the popular NoSQL database handles specific types of queries or commands.
An attacker can craft a malicious request that causes the server to return a response containing data from uninitialized heap memory. Because this action does not require authentication, any exposed MongoDB instance is a potential target.
An Elastic Security employee posted a proof-of-concept (PoC) exploit on GitHub, and Cybersecurity expert Kevin Beaumont validated it, stating that it harvests in-memory data such as:
The exploit does not allow for direct control over which memory is read, but an attacker can repeatedly query the server to collect a significant amount of data fragments over time. This information can then be pieced together to reconstruct sensitive information.
This issue affects MongoDB versions:
According to Wiz, which validated many internet-facing instances as exploitable, “42% of cloud environments have at least one instance of MongoDB in a version vulnerable to CVE-2025-14847, including both publicly exposed and internal resources,” and Censys has reported observing 87,000 potentially vulnerable instances worldwide.
In response to the discovery, MongoDB has released security patches, and administrators are strongly advised to immediately apply them to all affected MongoDB instances and upgrade to 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, or 4.4.30.
“If you cannot upgrade immediately, disable zlib compression on the MongoDB Server by starting mongod or mongos with a ‘networkMessageCompressors’ or a ‘net.compression.compressors’ option that explicitly omits zlib. Example safe values include snappy,zstd or disabled,” the advisory reads.
The exploitation activity appears to be opportunistic but well-timed, with attackers taking advantage of reduced monitoring and slower response cycles during the holiday period. Ben Ronallo, Principal Cybersecurity Engineer at Black Duck, said, "The threat actors were clever; they attacked during the holidays when many companies tend to be less responsive due to employees taking time off."
Ronallo shared the following for security teams:
Mayuresh Dani, Security Research Manager, at Qualys Threat Research Unit explained, "CVE-2025-14847 is dubbed "MongoBleed" and rightly so as it reliably leaks sensitive data from MongoDB instances akin to the infamous Heartbleed vulnerability in OpenSSL."
Dani recommended the following:
Last week, novice researchers were targeted via GitHub repositories containing fake PoC exploits for legitimate vulnerabilities.