- Description
- mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privilege, when a crafted file is stored in C:\node_modules\. This issue affects mongosh prior to 2.3.0
- Source
- cna@mongodb.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
New post from https://t.co/uXvPWJy6tj (CVE-2025-1756 | MongoDB mongosh up to 2.2.x File C:node_modules untrusted search path (RHSA-2025:1756)) has been published on https://t.co/tU7RWXqtGm
@WolfgangSesin
28 Feb 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
MongoDB Compass and Shell may be susceptible to local privilege escalation inWindowsURL: https://t.co/8EGK6uf0NJ: Important, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 7.5CVEs: CVE-2025-1755, CVE-2025-1756See also: https://t.co/4LTNldNJfc
@CharyyevPerman
28 Feb 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-1756 Local Privilege Escalation in mongosh Prior to 2.3.0 via Node Modules Directory https://t.co/5cCNyGdgNa
@VulmonFeeds
27 Feb 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ MongoDB Security Advisory: February 2025 Vulnerabilities *1. Local Privilege Escalation Vulnerabilities* *CVE-2025-1756 (MongoDB Shell)* 📅 Timeline: Disclosure: 2025-02-27 & Patch Release: 2025-02-27 🆔 CVE ID: CVE-2025-1756 📊 CVSS v3.1: Score: 7.5 (High 🟠) Vector:… h
@syedaquib77
27 Feb 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mongodb:mongosh:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "64C2BFE9-64C0-4711-A311-1DFDFEBE4477",
"versionEndExcluding": "2.3.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus:9.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2C4B0BD8-527F-4728-A64B-F8F06D5EDEC5"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4_aarch64:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "88F9EB73-1F19-4BD9-AB19-36F9F1A5156E"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "35232613-B8B5-4F4D-A6CD-3823C6666534"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "03A1BB59-4BE6-4339-ABB7-C18B7D899FB9"
},
{
"criteria": "cpe:2.3:a:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F0F1D571-6C70-45D9-BC76-C6DF33967127"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B03506D7-0FCD-47B7-90F6-DDEEB5C5A733"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DBF70805-7EBF-4731-83DB-D71F7A646B0F"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "01363FFA-F7A6-43FC-8D47-E67F95410095"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "069180B4-BA50-4AD0-8BA9-83F8005E58BE"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F843B777-5C64-4CAE-80D6-89DC2C9515B1"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FC3CBA5D-9E5D-4C46-B37E-7BB35BE8DADB"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "39D345D3-108A-4551-A112-5EE51991411A"
}
],
"operator": "OR"
}
]
}
]