Vulnerabilites related to mongodb - mongosh
Vulnerability from fkie_nvd
Published
2025-02-27 16:15
Modified
2025-04-09 14:07
Summary
mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privilege, when a crafted file is stored in C:\node_modules\. This issue affects mongosh prior to 2.3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mongodb:mongosh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "64C2BFE9-64C0-4711-A311-1DFDFEBE4477",
              "versionEndExcluding": "2.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C4B0BD8-527F-4728-A64B-F8F06D5EDEC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4_aarch64:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F9EB73-1F19-4BD9-AB19-36F9F1A5156E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "35232613-B8B5-4F4D-A6CD-3823C6666534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A1BB59-4BE6-4339-ABB7-C18B7D899FB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0F1D571-6C70-45D9-BC76-C6DF33967127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B03506D7-0FCD-47B7-90F6-DDEEB5C5A733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF70805-7EBF-4731-83DB-D71F7A646B0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*",
              "matchCriteriaId": "01363FFA-F7A6-43FC-8D47-E67F95410095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "069180B4-BA50-4AD0-8BA9-83F8005E58BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "F843B777-5C64-4CAE-80D6-89DC2C9515B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC3CBA5D-9E5D-4C46-B37E-7BB35BE8DADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "39D345D3-108A-4551-A112-5EE51991411A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user\u0027s system with elevated privilege, when a crafted file is stored in C:\\node_modules\\. This issue affects mongosh prior to 2.3.0"
    },
    {
      "lang": "es",
      "value": "Mongosh puede ser susceptible a una escalada de privilegios locales en determinadas condiciones, lo que podr\u00eda permitir acciones no autorizadas en el sistema de un usuario con privilegios elevados, cuando un archivo manipulado se almacena en C:\\node_modules\\. Este problema afecta a mongosh antes de la versi\u00f3n 2.3.0."
    }
  ],
  "id": "CVE-2025-1756",
  "lastModified": "2025-04-09T14:07:26.960",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 6.0,
        "source": "cna@mongodb.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-02-27T16:15:39.287",
  "references": [
    {
      "source": "cna@mongodb.com",
      "tags": [
        "Vendor Advisory",
        "Issue Tracking"
      ],
      "url": "https://jira.mongodb.org/browse/MONGOSH-2028"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2025:1756"
    }
  ],
  "sourceIdentifier": "cna@mongodb.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-426"
        }
      ],
      "source": "cna@mongodb.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-426"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2025-1756 (GCVE-0-2025-1756)
Vulnerability from cvelistv5
Published
2025-02-27 15:28
Modified
2025-02-27 16:06
CWE
Summary
mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privilege, when a crafted file is stored in C:\node_modules\. This issue affects mongosh prior to 2.3.0
Impacted products
Vendor Product Version
MongoDB Inc mongosh Version: 0   < 2.3.0
    cpe:2.3:a:mongodb:mongosh:0.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.15.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:0.15.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.90:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.91:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.10.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.10.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:1.10.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongosh:2.2.15:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1756",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-27T16:02:07.276063Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-27T16:06:31.860Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2025:1756"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:mongodb:mongosh:0.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.3.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.5.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.5.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.6.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.7.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.8.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.8.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.8.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.9.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.10.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.10.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.11.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.12.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.12.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.13.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.14.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.15.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.15.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:0.15.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.0.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.0.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.1.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.1.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.1.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.1.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.1.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.1.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.2.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.3.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.4.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.5.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.5.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.5.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.5.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.6.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.6.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.6.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.7.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.7.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.8.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.8.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.90:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.91:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.10.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.10.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.10.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.10.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.10.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.10.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:1.10.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.1.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.1.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.1.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.1.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.12:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongosh:2.2.15:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "mongosh",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "2.3.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eOnly environments with Windows as the underlying operating system is affected by this issue\u003c/p\u003e\u003cbr\u003e"
            }
          ],
          "value": "Only environments with Windows as the underlying operating system is affected by this issue"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "T. Do\u011fa Geli\u015fli"
        }
      ],
      "datePublic": "2025-02-27T13:15:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003emongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user\u0027s system with elevated privilege, when a crafted file is stored in C:\\node_modules\\. This issue affects mongosh prior to 2.3.0\u003c/p\u003e"
            }
          ],
          "value": "mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user\u0027s system with elevated privilege, when a crafted file is stored in C:\\node_modules\\. This issue affects mongosh prior to 2.3.0"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-426",
              "description": "CWE-426: Untrusted Search Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-27T15:28:11.633Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/MONGOSH-2028"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "MongoDB Shell may be susceptible to local privilege escalation in Windows",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2025-1756",
    "datePublished": "2025-02-27T15:28:11.633Z",
    "dateReserved": "2025-02-27T13:02:02.998Z",
    "dateUpdated": "2025-02-27T16:06:31.860Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}