Massive MongoDB Vulnerability Exposes Sensitive Data: 87,000 IPs at Risk, Urgent Patching Required

December 30, 2025
Massive MongoDB Vulnerability Exposes Sensitive Data: 87,000 IPs at Risk, Urgent Patching Required
  • MongoDB remains globally widespread, deployed across tens of thousands of organizations, including many Fortune 500s.

  • If immediate patching isn’t feasible, defenders should disable zlib compression on MongoDB servers to reduce the risk.

  • Patches were applied on December 19, 2025, yet exploitation has already been observed in the wild, signaling widespread exposure and ongoing risk.

  • CISA aligns with Wiz’s findings, adding MongoBleed to the Known Exploited Vulnerabilities catalog and urging vendors to provide mitigations or discontinue the product if none are available.

  • A MongoBleed Detector tool is available to help identify vulnerable servers by parsing MongoDB logs.

  • Shadowserver and Censys warn of a large exposed surface: more than 74,000 publicly accessible MongoDB instances may be vulnerable, and over 87,000 IPs show fingerprints of potentially unpatched versions.

  • CISA has directed Federal Civilian Executive Branch agencies to patch CVE-2025-14847 (MongoBleed) within three weeks, by January 19, 2026.

  • The vulnerability arises from MongoDB Server’s handling of network packets with zlib, enabling unauthenticated attackers to remotely exfiltrate credentials and other sensitive data with low effort and no user interaction.

  • Elastic researcher Joe Desimone released a proof-of-concept exploit for unpatched hosts, and Wiz notes that about 42% of visible systems host at least one vulnerable MongoDB instance, indicating a significant cloud impact.

Summary based on 1 source


Get a daily email with more Tech stories

Source

More Stories