New MongoDB vulnerability lets attackers crash exposed servers with tiny requests


A newly documented MongoDB denial-of-service flaw, CVE-2026-25611, can let an unauthenticated attacker exhaust server memory and crash a MongoDB instance by sending specially crafted messages over the network. The NVD description states that crafted unauthenticated messages can exhaust available memory and crash MongoDB.

MongoDB has already shipped fixes across supported release trains. MongoDB’s release notes confirm that MongoDB 8.2.4, 8.0.18, and 7.0.29 include a fix for CVE-2026-25611.

Security researchers at Cato CTRL explain the practical abuse case: an attacker can trigger large memory allocations by abusing the compression path in MongoDB’s wire protocol, then repeat that across multiple connections until the instance hits out-of-memory conditions. Cato also says Shodan data suggests a very large number of MongoDB servers remain reachable from the public internet.

This is a pure availability issue. NVD lists impact as availability loss, with no direct confidentiality or integrity impact in the scoring vector. Still, downtime for a database can quickly become an outage for everything that depends on it.

Publicly accessible MongoDB servers based on Shodan(source : catonetworks)

What CVE-2026-25611 is

NVD describes CVE-2026-25611 as asymmetric resource consumption (CWE-405), where small attacker input can force high resource usage on the server, leading to a crash.

Cato CTRL ties the issue to MongoDB’s compressed message handling (OP_COMPRESSED) and says the server allocates memory based on an attacker-controlled “uncompressed size” field before it fully validates the decompressed result.

Fixed versions

MongoDB lists CVE-2026-25611 as fixed in these releases:

MongoDB release trainVersion that includes the fixSource
8.28.2.4MongoDB release notes
8.08.0.18MongoDB release notes
7.07.0.29MongoDB release notes

MongoDB also links the underlying engineering work from the CVE record to server-side issues that tightened compressor handling and capped network-buffer memory allocation.

MongoDB DoS attack sequence (Source: catonetworks )

How the attack works in practice

StepWhat happensWhy it hurts
1Attacker sends crafted compressed messages to a MongoDB endpointInput stays small while claimed “uncompressed” size stays large
2Server allocates memory based on attacker-controlled sizingMemory consumption grows per connection
3Attacker repeats across many concurrent connectionsServer hits RAM pressure and may crash or get OOM-killed

What defenders should do now

  • Patch first
    • Upgrade to 8.2.4, 8.0.18, or 7.0.29 based on your train.
  • Remove public exposure
    • Do not leave MongoDB listening on the public internet. Even without this bug, exposed databases remain a common target.
    • If you must support remote access, put MongoDB behind a VPN or a private access layer and restrict source IPs.
  • Disable compression as a stopgap
    • Cato CTRL says you can disable network message compression using --networkMessageCompressors=disabled if you cannot upgrade immediately.
  • Apply connection guardrails
    • Cato recommends tightening connection limits (for example, maxIncomingConnections) and watching for bursts of connections to port 27017.
vulnerable code(Source: catonetworks )

Detection and monitoring signals

SignalWhat to watch for
Connection behaviorSudden spikes in new TCP connections to 27017, especially many short-lived or idle sessions
Packet patternVery small compressed packets paired with unusually large claimed uncompressed sizes (researchers highlight this as a key signature)
Host telemetryRapid MongoDB memory growth, kernel OOM activity targeting mongod, and service restarts

FAQ

What is CVE-2026-25611?

NVD describes it as a bug where crafted unauthenticated messages can exhaust memory and crash a MongoDB server.

Is this remote and unauthenticated?

Yes. NVD’s CVSS vector lists network attack with no privileges required and availability impact.

Which versions contain the fix?

MongoDB release notes confirm fixes in 8.2.4, 8.0.18, and 7.0.29.

Does this affect MongoDB Atlas?

Cato CTRL says the issue affects deployments with compression enabled, including Atlas, depending on configuration and exposure. Treat this as relevant for any environment that exposes MongoDB endpoints and confirm your patch status through your provider tooling.

What is the fastest mitigation if I cannot patch today?

Disable network message compression and block public access to MongoDB while you schedule an upgrade.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages