The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the form of the user using ‘tab’ to autocomplete text that is a prefix of the attacker’s prepared autocompletion. This issue affects mongosh versions prior to 2.3.9.  The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.
History

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 27 Feb 2025 15:30:00 +0000

Type Values Removed Values Added
Description The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the form of the user using ‘tab’ to autocomplete text that is a prefix of the attacker’s prepared autocompletion. This issue affects mongosh versions prior to 2.3.9.  The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker. The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the form of the user using ‘tab’ to autocomplete text that is a prefix of the attacker’s prepared autocompletion. This issue affects mongosh versions prior to 2.3.9.  The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.
First Time appeared Mongodb
Mongodb mongosh
CPEs cpe:2.3:a:mongodb:mongosh:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.11.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.12.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.12.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.13.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.14.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.15.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.15.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.15.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.7.7:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.5:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.10.6:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.90:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:1.91:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:mongodb:mongosh:2.3.8:*:*:*:*:*:*:*
Vendors & Products Mongodb
Mongodb mongosh

Thu, 27 Feb 2025 13:00:00 +0000

Type Values Removed Values Added
Description The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the form of the user using ‘tab’ to autocomplete text that is a prefix of the attacker’s prepared autocompletion. This issue affects mongosh versions prior to 2.3.9.  The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.
Title MongoDB Shell may be susceptible to Control Character Injection via autocomplete
Weaknesses CWE-74
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mongodb

Published: 2025-02-27T12:34:02.752Z

Updated: 2025-02-27T15:18:23.418Z

Reserved: 2025-02-25T13:35:22.403Z

Link: CVE-2025-1691

cve-icon Vulnrichment

Updated: 2025-02-27T14:33:10.278Z

cve-icon NVD

Status : Received

Published: 2025-02-27T13:15:11.253

Modified: 2025-02-27T16:15:38.610

Link: CVE-2025-1691

cve-icon Redhat

No data.