Impact
An improper check of the profile command causes a request that modifies the filter to be treated as read‑only. This allows an attacker to change configuration settings that should otherwise be protected, potentially leading to unauthorized configuration changes or privilege escalation within the MongoDB instance.
Affected Systems
The vulnerability affects MongoDB Server from MongoDB Inc. No specific versions are listed, so all releases of MongoDB Server may be impacted until a fix is deployed.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, while the very low EPSS score (<1%) suggests exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack requires the ability to issue commands against the database, so an authenticated or remotely compromised client that can send profile commands could exploit this flaw to alter filter settings. No additional exploitation conditions are indicated beyond this inferred command‑execution capability.
OpenCVE Enrichment