Description
A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.
Published: 2026-03-17
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Use‑After‑Free
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free flaw exists in the classic engine of MongoDB Server that can be exploited when an authenticated user possessing a read role issues a specially crafted $lookup or $graphLookup aggregation pipeline. The vulnerability can subvert normal memory handling, potentially leading to arbitrary code execution or service disruption for the affected cluster. The flaw originates from improper deallocation of ExpressionContext objects, a classic memory safety weakness.

Affected Systems

MongoDB Server deployments, specifically versions 8.3.0 alpha 0‑3 and release candidate 1 are known to be impacted; other unpatched releases may also be vulnerable. The flaw is present in sharded clusters where the aggregation framework processes $lookup or $graphLookup stages.

Risk and Exploitability

The CVSS score of 8.7 classifies the vulnerability as high severity, while the EPSS score of less than 1% indicates a relatively low probability of exploitation in the wild. The flaw is not listed in CISA’s KEV catalog, so no widespread, publicly known exploitation has been reported. Attackers must be authenticated with at least read permission, meaning the threat surface is limited to users with legitimate cluster access or compromised credentials. If exploited, the attacker could gain control over the server or cause a denial of service.

Generated by OpenCVE AI on April 10, 2026 at 18:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the MongoDB Server version; if it is 8.3.0 alpha or rc, apply the latest patched release from MongoDB. If a patch is not yet available, restrict the use of $lookup and $graphLookup pipelines or remove them from customer applications. Ensure that only trusted users with minimal privileges have access to aggregation pipelines that contain these operators. Monitor cluster logs for abnormal aggregation activity and apply security hardening guidance from MongoDB’s release notes.

Generated by OpenCVE AI on April 10, 2026 at 18:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Mongodb mongodb
CPEs cpe:2.3:a:mongodb:mongodb:*:*:*:*:-:*:*:*
cpe:2.3:a:mongodb:mongodb:8.3.0:alpha0:*:*:-:*:*:*
cpe:2.3:a:mongodb:mongodb:8.3.0:alpha1:*:*:-:*:*:*
cpe:2.3:a:mongodb:mongodb:8.3.0:alpha2:*:*:-:*:*:*
cpe:2.3:a:mongodb:mongodb:8.3.0:alpha3:*:*:-:*:*:*
cpe:2.3:a:mongodb:mongodb:8.3.0:rc1:*:*:-:*:*:*
Vendors & Products Mongodb mongodb

Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Mongodb
Mongodb mongodb Server
Vendors & Products Mongodb
Mongodb mongodb Server

Tue, 17 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.
Title ExpressionContext use-after-free in classic engine $lookup and $graphLookup aggregation operators
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Mongodb Mongodb Mongodb Server
cve-icon MITRE

Status: PUBLISHED

Assigner: mongodb

Published:

Updated: 2026-03-18T03:55:44.426Z

Reserved: 2026-03-13T17:18:13.718Z

Link: CVE-2026-4148

cve-icon Vulnrichment

Updated: 2026-03-17T16:10:20.716Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-17T16:16:23.807

Modified: 2026-04-10T17:38:37.107

Link: CVE-2026-4148

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:28:26Z

Weaknesses