Overview
- MongoDB Inc.
- MongoDB Server
Description
Statistics
- 16 Posts
- 1115 Interactions
Fediverse
Merry Christmas to everybody, except that dude who works for Elastic, who decided to drop an unauthenticated exploit for MongoDB on Christmas Day, that leaks memory and automates harvesting secrets (e.g. database passwords)
CVE-2025-14847 aka MongoBleed
Exp: https://github.com/joe-desimone/mongobleed/blob/main/mongobleed.py
This one is incredibly widely internet facing and will very likely see mass exploitation and impactful incidents
Impacts every MongoDB version going back a decade.
Shodan dork: product:"MongoDB"
Oh. yay.
"mongobleed" — https://github.com/joe-desimone/mongobleed/blob/main/mongobleed.py
CVE-2025-14847
"Exploits zlib decompression bug to leak server memory via BSON field names.”
"Technique: Craft BSON with inflated doc_len, server reads field names from leaked memory until null byte.”
There’s a great blog on detecting MongoBleed exploitation via Velociraptor https://blog.ecapuano.com/p/hunting-mongobleed-cve-2025-14847
@hrbrmstr looks like it needs to be send to a mongodb port that accepts BSON, right?
I’m hoping (against hope) people do not have those dangling on the internet by default?
[Edit: hope is, as they say, not a strategy…]
- MongoDB has nothing to do with MySQL
- A memory disclosure is not an RCE (but you should probably prioritize similarly in this case)
CVE-2025-14847
đźź CVE-2025-14847 - High (7.5)
Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0...
đź”— https://www.thehackerwire.com/vulnerability/CVE-2025-14847/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
🔍 HIGH severity: MongoDB flaw (CVE-2025-14847) lets unauthenticated users read uninitialized memory via zlib. Affects v3.6–8.2.3. Patch now or disable zlib compression for mitigation. Full details: https://radar.offseq.com/threat/new-mongodb-flaw-lets-unauthenticated-attackers-re-701f4a01 #OffSeq #MongoDB #Infosec #Vulnerability
[VULN] ⚠️ MongoDB alerte sur une faille RCE à haute gravité et urge de patcher
L'éditeur met en garde contre une vulnérabilité pouvant être exploitée pour de l’exécution de code à distance (RCE), avec des attaques ciblant des serveurs vulnérables.
(https://cyberveille.ch/posts/2025-12-26-mongodb-alerte-sur-une-faille-rce-a-haute-gravite-et-urge-de-patcher/)
⬇️
đź”— Source originale : https://www.bleepingcomputer.com/news/security/mongodb-warns-admins-to-patch-severe-rce-flaw-immediately/
PoC disponible (vecteur simple, peu de prérequis techniques,
surface d’attaque large, exploitation reproductible) 👀 : mongobleed
⬇️
• Impact observé: fuite de fragments de mémoire pouvant contenir des éléments sensibles tels que des journaux internes MongoDB, l’état du serveur, des paramètres WiredTiger, des données de /proc (ex. meminfo, statistiques réseau), des chemins Docker, des UUID de connexion et des IP clients. Le PoC montre des exemples de fuites (p. ex. MemAvailable, compteurs réseau) et indique la quantité totale de données exfiltrées ainsi que le nombre de fragments uniques. ⚠️
( https://cyberveille.ch/posts/2025-12-26-cve-2025-14847-mongobleed-fuite-de-memoire-non-authentifiee-dans-mongodb-correctifs-disponibles/ )
[Advisory officiel]
👇
https://jira.mongodb.org/browse/SERVER-115508
typiquement, si vous avez un contrôleur #UniFi exposé veut mieux verifier les règles firewall pour bloquer...
👇
https://community.ui.com/questions/MongoDB-warns-admins-to-patch-severe-RCE-flaw-immediately/6d64c7a3-0f22-496a-9bd2-023c02fcd126#answer/20ec3b97-d0c6-4f63-b2f5-d4953be27ad3
đź’¬
⬇️
https://infosec.pub/post/39604416
Bluesky
Overview
- langchain-ai
- langchain
Description
Statistics
- 5 Posts
- 1 Interaction
Fediverse
Der LangGrinch bedroht KI-Systeme weltweit mit einer kritischen Schwachstelle. Administratoren mĂĽssen sofort handeln, bevor Angreifer Zugriff auf geheime Umgebungsvariablen erhalten.
https://t3n.de/news/langgrinch-langchain-core-sicherheitsluecke-cve-2025-68664-1723178/
LangGrinch: Kritische LĂĽcke in LangChain-Core bedroht KI-Agenten
https://t3n.de/news/langgrinch-langchain-core-sicherheitsluecke-cve-2025-68664-1723178/?utm_source=flipboard&utm_medium=activitypub
Gepostet in Software & Entwicklung | t3n @software-entwicklung-t3n-t3n
Bluesky
Overview
Description
Statistics
- 5 Posts
Fediverse
Fortinet confirms active exploitation of CVE-2020-12812.
A long-standing FortiOS SSL VPN flaw can bypass 2FA due to username case-sensitivity mismatches - especially in legacy deployments.
https://www.technadu.com/fortinet-warns-july-disclosed-ssl-vpn-flaw-is-being-used-to-bypass/616801/
Thoughts on mitigating MFA bypass risks?
Bluesky
Overview
Description
Statistics
- 2 Posts
- 14 Interactions
Fediverse
../ and DNS?! It really is the season of magic.
https://www.cve.org/CVERecord?id=CVE-2025-57403
Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using
os.path.join. This bypass allows directory traversal or absolute path injection, leading to the potential exposure of sensitive information.
đźź CVE-2025-57403 - High (7.5)
Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using os.path.join. This bypass allows directory...
đź”— https://www.thehackerwire.com/vulnerability/CVE-2025-57403/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
Description
Statistics
- 2 Posts
- 6 Interactions
Fediverse
I don't know about this specific device, but these types of devices tend to be used a lot in remote OT systems, often with the management interface exposed, and almost no monitoring. Other similar modems have been successfully exploited ITW for some interesting incidents.
https://www.cve.org/CVERecord?id=CVE-2025-67015
Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellite Modem with firmware v2.5.1 allows attackers to change the Administrator password and escalate privileges via sending a crafted POST request to
/Forms/admin_access_1.
đźź CVE-2025-67015 - High (7.5)
Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellite Modem with firmware v2.5.1 allows attackers to change the Administrator password and escalate privileges via sending a crafted POST request to /Forms/admin_access_1.
đź”— https://www.thehackerwire.com/vulnerability/CVE-2025-67015/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
- apiDoc
- apidoc-core
Description
Statistics
- 2 Posts
- 3 Interactions
Fediverse
🔥 CRITICAL: CVE-2025-13158 in apidoc-core (0.2.0+) enables remote prototype pollution via malformed input. Risks: DoS & unpredictable JS app behavior. Audit, sanitize, and isolate now — no patch yet! https://radar.offseq.com/threat/cve-2025-13158-cwe-1321-improperly-controlled-modi-61fce7bb #OffSeq #Vulnerability #JavaScript #SupplyChain
Overview
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
Post-auth BoF in IBM Concert.
đźź CVE-2025-12771 - High (7.8)
IBM Concert 1.0.0 through 2.1.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local user could overflow the buffer and execute arbitrary code on the system.
đź”— https://www.thehackerwire.com/vulnerability/CVE-2025-12771/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
- IBM
- API Connect
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
sev:CRIT auth bypass in IBM API Connect.
🚨 CRITICAL: CVE-2025-13915 in IBM API Connect (10.0.8.0–10.0.8.5, 10.0.11.0) enables remote auth bypass (CWE-305)! No patch yet. Restrict access, monitor logs, and prep for updates. More: https://radar.offseq.com/threat/cve-2025-13915-cwe-305-authentication-bypass-by-pr-11cca0f4 #OffSeq #IBM #Infosec #APIsecurity #CVE202513915
Overview
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
https://medium.com/@Debugger/hunting-cve-2025-59287-in-memory-dumps-b70afd7d2dcf?source=rss-3ba65b326b28------2
Overview
- n8n-io
- n8n
Description
Statistics
- 3 Posts
Fediverse
đź”´ CVE-2025-68668 - Critical (9.9)
n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploi...
đź”— https://www.thehackerwire.com/vulnerability/CVE-2025-68668/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
⚠️ CRITICAL: CVE-2025-68668 in n8n-io n8n (v1.0.0–<2.0.0) allows authenticated users to bypass the Python Code Node sandbox & run arbitrary commands. Patch to 2.0.0+ or disable the node for mitigation. Full details: https://radar.offseq.com/threat/cve-2025-68668-cwe-693-protection-mechanism-failur-bcbb4231 #OffSeq #n8n #CVE202568668 #infosec