Description
The MongoDB C Driver's legacy GridFS API accepts malformed file metadata from the database without adequate validation. Crafted documents in a GridFS collection may cause any application that reads those files via the legacy API to either crash (via a division-by-zero) or silently leak process memory contents (via an out-of-bounds read).
Published: 2026-05-20
Score: 6 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The MongoDB C Driver’s legacy GridFS API mishandles malformed file metadata, allowing crafted documents in a GridFS collection to trigger a division‑by‑zero exception that crashes any application using the legacy API, or to perform an out‑of‑bounds read that leaks process memory. The flaw is identified as CWE‑1285, highlighting an out‑of‑bounds read that can be abused to disclose sensitive information or destabilize the application. The primary impact is a potential denial of service through crashes and a confidentiality breach via leakage of memory contents.

Affected Systems

Affected systems are the MongoDB, Inc. C Driver, particularly the legacy GridFS file reader component. No version range is specified in the advisory, so all releases that include the legacy API could be vulnerable. Applications that use the legacy GridFS API to read files from a MongoDB instance are the target.

Risk and Exploitability

The CVSS score of 6.0 indicates a moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting no documented exploitation yet. The likely attack vector requires the ability to place malicious documents in a GridFS collection or tamper with existing ones, implying that an attacker with write access to the database or the ability to influence client applications could exploit the issue. Because the flaw is a memory safety bug that can lead to crashes or data leakage, it is exploitable when the legacy API processes controlled metadata. Exploitation conditions do not require privileged system access; local or remote attackers who can affect the database contents are sufficient.

Generated by OpenCVE AI on May 20, 2026 at 17:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the MongoDB C Driver to the latest release, which includes a fix for the malformed metadata handling in the legacy GridFS API.
  • Disable or remove usage of the legacy GridFS API from client applications; migrate to the newer GridFS API that validates metadata.
  • Implement client‑side validation of GridFS file metadata to ensure sizes and offsets fall within expected bounds before passing them to the driver.
  • If an update or migration is not immediately possible, segregate the MongoDB instance that stores GridFS collections from untrusted write access, limiting the ability of attackers to inject malicious documents.

Generated by OpenCVE AI on May 20, 2026 at 17:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Mongodb
Mongodb c Driver
Vendors & Products Mongodb
Mongodb c Driver

Wed, 20 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description The MongoDB C Driver's legacy GridFS API accepts malformed file metadata from the database without adequate validation. Crafted documents in a GridFS collection may cause any application that reads those files via the legacy API to either crash (via a division-by-zero) or silently leak process memory contents (via an out-of-bounds read).
Title Heap memory out of bounds read and crash in C Driver legacy GridFS file reader
Weaknesses CWE-1285
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H'}

cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Mongodb C Driver
cve-icon MITRE

Status: PUBLISHED

Assigner: mongodb

Published:

Updated: 2026-05-20T17:20:32.902Z

Reserved: 2026-05-20T15:13:47.129Z

Link: CVE-2026-9100

cve-icon Vulnrichment

Updated: 2026-05-20T17:20:29.521Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-20T17:16:32.360

Modified: 2026-05-20T17:32:35.827

Link: CVE-2026-9100

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T18:00:14Z

Weaknesses