CVE-2025-1756

Published Feb 27, 2025

Last updated 5 months ago

Overview

Description
mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privilege, when a crafted file is stored in C:\node_modules\. This issue affects mongosh prior to 2.3.0
Source
cna@mongodb.com
NVD status
Analyzed
Products
mongosh, codeready_linux_builder_eus, codeready_linux_builder_for_arm64_eus, codeready_linux_builder_for_ibm_z_systems_eus, codeready_linux_builder_for_power_little_endian_eus, enterprise_linux_update_services_for_sap_solutions, enterprise_linux_eus, enterprise_linux_for_arm_64, enterprise_linux_for_arm_64_eus, enterprise_linux_for_ibm_z_systems, enterprise_linux_for_ibm_z_systems_eus, enterprise_linux_for_power_little_endian_eus, enterprise_linux_server_aus

Risk scores

CVSS 3.1

Type
Primary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

cna@mongodb.com
CWE-426
nvd@nist.gov
CWE-426

Social media

Hype score
Not currently trending

Configurations