
Cloud Vulnerability DB
A community-led vulnerabilities database
MongoDB Server has disclosed a vulnerability (CVE-2025-3084) affecting its explain command functionality. The vulnerability was discovered and disclosed on April 1, 2025, affecting multiple versions of MongoDB Server including v5.0 prior to 5.0.31, v6.0 prior to 6.0.20, v7.0 prior to 7.0.16, and v8.0 prior to 8.0.4. The issue stems from improper validation of certain arguments in the explain command, which is commonly used for debugging purposes (MongoDB Patches, NVD).
The vulnerability is characterized by a failure to validate specific argument combinations before their use in the explain command, which is a debugging tool frequently utilized by developers and administrators for analyzing query execution plans. The severity of this vulnerability has been assessed with a CVSS v3.1 base score of 6.5 (Medium), with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The vulnerability has been classified under CWE-703 (Improper Check or Handling of Exceptional Conditions) (NVD, MongoDB Patches).
When exploited, this vulnerability can lead to crashes in router servers, potentially causing service disruption. The impact is particularly significant in router server contexts, where an attacker can craft a query that brings down nodes with minimal effort (MongoDB Patches).
MongoDB has released patches to address this vulnerability. Organizations are advised to upgrade to the following versions based on their current deployment: MongoDB Server 5.0.31 or later, MongoDB Server 6.0.20 or later, MongoDB Server 7.0.16 or later, or MongoDB Server 8.0.4 or later (MongoDB Patches).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."