Uploaded image for project: 'MongoDB Shell'
  1. MongoDB Shell
  2. MONGOSH-2026

MongoDB Shell may be susceptible to control character Injection via shell output

    • Type: Icon: Bug Bug
    • Resolution: Fixed
    • Priority: Icon: Major - P3 Major - P3
    • 2.3.9
    • Affects Version/s: None
    • Component/s: None
    • None
    • Environment:
      OS:
      node.js / npm versions:
      Additional info:
    • Developer Tools

      CVE ID:

      CVE-2025-1693

      Title:
      MongoDB Shell may be susceptible to control character Injection via shell output

      Description:
      The MongoDB Shell may be susceptible to control character injection where an attacker with control over the database cluster contents can inject control characters into the shell output. This may result in the display of falsified messages that appear to originate from mongosh or the underlying operating system, potentially misleading users into executing unsafe actions.

      The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.

      This issue affects mongosh versions prior to 2.3.9

      CVSS Score: 

      3.9 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

      Affected Product Versions:

      This issue affects mongosh versions prior to 2.3.9

      CWE:        
      CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences

      Required Configuration:

      The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.

            Assignee:
            karman.liu@mongodb.com Karman Liu
            Reporter:
            karman.liu@mongodb.com Karman Liu
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved: