Post-Authentication Vulnerability in MongoDB Server Affecting Transaction Integrity
CVE-2025-14345
2.3LOW
What is CVE-2025-14345?
A flaw within the network two-phase commit protocol in MongoDB Server can lead to unpredictable logical data inconsistencies during cross-shard transactions. This vulnerability arises post-authentication and may cause the transaction coordination logic to mistakenly identify a transaction as committed. The resulting effect is an inconsistent state across affected shards, potentially impacting data integrity and availability. It is imperative for users of MongoDB Server versions v8.0.16 and prior, v7.0.26 and prior, and v8.2.2 and prior to assess their systems for this vulnerability.
Affected Version(s)
MongoDB Server 7.0 < 7.0.26
MongoDB Server 8.0 < 8.0.16
MongoDB Server 8.2 < 8.2.2
References
CVSS V4
Score:
2.3
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved