Description
mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privilege, when a crafted file is stored in C:\node_modules\. This issue affects mongosh prior to 2.3.0
Published: 2025-02-27
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-5459 mongosh vulnerable to local privilege escalation
Github GHSA Github GHSA GHSA-f5w3-73h4-jpcm mongosh vulnerable to local privilege escalation
History

Wed, 09 Apr 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat codeready Linux Builder Eus
Redhat codeready Linux Builder For Arm64 Eus
Redhat codeready Linux Builder For Ibm Z Systems Eus
Redhat codeready Linux Builder For Power Little Endian Eus
Redhat enterprise Linux Eus
Redhat enterprise Linux For Arm 64
Redhat enterprise Linux For Arm 64 Eus
Redhat enterprise Linux For Ibm Z Systems
Redhat enterprise Linux For Ibm Z Systems Eus
Redhat enterprise Linux For Power Little Endian Eus
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Update Services For Sap Solutions
CPEs cpe:2.3:a:mongodb:mongosh:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_eus:9.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4_aarch64:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*
Vendors & Products Redhat
Redhat codeready Linux Builder Eus
Redhat codeready Linux Builder For Arm64 Eus
Redhat codeready Linux Builder For Ibm Z Systems Eus
Redhat codeready Linux Builder For Power Little Endian Eus
Redhat enterprise Linux Eus
Redhat enterprise Linux For Arm 64
Redhat enterprise Linux For Arm 64 Eus
Redhat enterprise Linux For Ibm Z Systems
Redhat enterprise Linux For Ibm Z Systems Eus
Redhat enterprise Linux For Power Little Endian Eus
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Update Services For Sap Solutions

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 27 Feb 2025 16:45:00 +0000

Type Values Removed Values Added
References

Thu, 27 Feb 2025 15:45:00 +0000

Type Values Removed Values Added
Description mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privilege, when a crafted file is stored in C:\node_modules\. This issue affects mongosh prior to 2.3.0
Title MongoDB Shell may be susceptible to local privilege escalation in Windows
First Time appeared Mongodb
Mongodb mongosh
Weaknesses CWE-426
CPEs cpe:2.3:a:mongodb:mongosh:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.11.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.12.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.12.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.13.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.14.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.15.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.15.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.15.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.7.7:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.5:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.6:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.90:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.91:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.9:*:*:*:*:*:*:*
Vendors & Products Mongodb
Mongodb mongosh
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

Mongodb Mongosh
Redhat Codeready Linux Builder Eus Codeready Linux Builder For Arm64 Eus Codeready Linux Builder For Ibm Z Systems Eus Codeready Linux Builder For Power Little Endian Eus Enterprise Linux Eus Enterprise Linux For Arm 64 Enterprise Linux For Arm 64 Eus Enterprise Linux For Ibm Z Systems Enterprise Linux For Ibm Z Systems Eus Enterprise Linux For Power Little Endian Eus Enterprise Linux Server Aus Enterprise Linux Update Services For Sap Solutions
cve-icon MITRE

Status: PUBLISHED

Assigner: mongodb

Published:

Updated: 2025-02-27T16:06:31.860Z

Reserved: 2025-02-27T13:02:02.998Z

Link: CVE-2025-1756

cve-icon Vulnrichment

Updated: 2025-02-27T16:05:11.299Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-27T16:15:39.287

Modified: 2025-04-09T14:07:26.960

Link: CVE-2025-1756

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses