By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: MongoBleed Vulnerability Allows Attackers to Read Data From MongoDB’s Heap Memory
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > MongoBleed Vulnerability Allows Attackers to Read Data From MongoDB’s Heap Memory
News

MongoBleed Vulnerability Allows Attackers to Read Data From MongoDB’s Heap Memory

News Room
Last updated: 2026/01/10 at 3:48 AM
News Room Published 10 January 2026
Share
MongoBleed Vulnerability Allows Attackers to Read Data From MongoDB’s Heap Memory
SHARE

MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server versions. According to the disclosure, the flaw can be exploited remotely by unauthenticated attackers with low complexity, potentially leading to the exfiltration of sensitive data and credentials.

Dubbed MongoBleed after the notoriously famous Heartbleed, the vulnerability has a CVSS score of 8.7 and is triggered by improper handling of zlib-compressed network traffic, allowing unauthenticated attackers to leak uninitialized memory and potentially steal sensitive data such as credentials or tokens from affected MongoDB servers. According to security researchers at Wiz, the flaw is being actively exploited in the wild.

As stated in MongoDB’s announcement, managed instances on MongoDB Atlas have already been patched, but self-hosted MongoDB deployments remain at risk if not updated. Organizations are strongly advised to apply security patches immediately or disable compression and restrict network exposure. Merav Bar, Amitai Cohen, Yaara Shriki, and Gili Tikochinski explain:

CVE-2025-14847 stems from a flaw in MongoDB Server’s zlib-based network message decompression logic, which is processed prior to authentication. By sending malformed, compressed network packets, an unauthenticated attacker can trigger the server to mishandle decompressed message lengths, resulting in uninitialized heap memory being returned to the client.

According to the Wiz article, 42% of cloud environments have at least one vulnerable MongoDB instance, and Censys reports roughly 87,000 potentially exposed servers worldwide. Since the flaw can be exploited without authentication or user interaction, database servers exposed to the internet face especially high risk. The Wiz team adds:

At a code level, the vulnerability was caused by incorrect length handling in message_compressor_zlib.cpp. The affected logic returned the allocated buffer size (output.length()) instead of the actual decompressed data length, allowing undersized or malformed payloads to expose adjacent heap memory.

The bug affects all MongoDB versions released since 2017. Gourav Boiri, software developer at Linkfields Innovations, comments:

MongoBleed highlights how even mature databases can become critical attack surfaces when exposed or unpatched. Pre-auth memory disclosure, active exploitation, and 87K+ exposed instances – a reminder that database security is infrastructure security.

In the “MongoBleed Explained Simply” article, Stanislav Kozlovski explains how the vulnerability works and warns:

It is dead-easy to exploit – it only requires connectivity to the database (no auth needed). It is fixed as of writing, but some EOL versions (3.6, 4.0, 4.2) will not get it.

Eric Capuano, InfoSec founder and practitioner, explains instead how to detect from the logs if database servers have been exploited. In a popular Reddit thread, user misteryub argues:

The argument many people make is open source code is more secure than closed source code or security issues would be found much quicker in open source code. The existence of a bug of this caliber existed is a counter argument to the former.

Kozlovski disagrees:

When people say that open-source is more secure, they usually mean open-source projects with an active community. Mongo seemingly didn’t have this in 2017, as the PR which introduced the bug wasn’t reviewed in the public GitHub.

MongoDB patched builds are now available for all supported versions from 4.4 through 8.0. Forks like Percona Server for MongoDB are also affected by the upstream vulnerability.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Grok AI Image Tools On X Now Locked Behind Paywall After UK Pressure Grok AI Image Tools On X Now Locked Behind Paywall After UK Pressure
Next Article Ukraine’s defense tech sector must guard against innovation drain Ukraine’s defense tech sector must guard against innovation drain
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

ByteDance to expand its micro drama business · TechNode
ByteDance to expand its micro drama business · TechNode
Computing
Xiaomi announces Electric Motor V8s won its 10 Million Technology Award · TechNode
Xiaomi announces Electric Motor V8s won its 10 Million Technology Award · TechNode
Computing
Webflow Website Builder Review: A High-Quality CMS With Lots of Upselling
Webflow Website Builder Review: A High-Quality CMS With Lots of Upselling
News
How to Remove Sora Watermark for Free: 2 Fast & Reliable Methods (No Quality Loss)
How to Remove Sora Watermark for Free: 2 Fast & Reliable Methods (No Quality Loss)
Gadget

You Might also Like

Webflow Website Builder Review: A High-Quality CMS With Lots of Upselling
News

Webflow Website Builder Review: A High-Quality CMS With Lots of Upselling

4 Min Read
Walmart expands drone deliveries across the U.S.
News

Walmart expands drone deliveries across the U.S.

2 Min Read
How to dress for work without spending a fortune – or sacrificing personal style
News

How to dress for work without spending a fortune – or sacrificing personal style

8 Min Read
Every Roku Remote You Can Buy, Ranked From Worst To Best – BGR
News

Every Roku Remote You Can Buy, Ranked From Worst To Best – BGR

9 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?