Massive MongoDB Vulnerability Exposes Sensitive Data: 87,000 IPs at Risk, Urgent Patching Required
December 30, 2025
MongoDB remains globally widespread, deployed across tens of thousands of organizations, including many Fortune 500s.
If immediate patching isn’t feasible, defenders should disable zlib compression on MongoDB servers to reduce the risk.
Patches were applied on December 19, 2025, yet exploitation has already been observed in the wild, signaling widespread exposure and ongoing risk.
CISA aligns with Wiz’s findings, adding MongoBleed to the Known Exploited Vulnerabilities catalog and urging vendors to provide mitigations or discontinue the product if none are available.
A MongoBleed Detector tool is available to help identify vulnerable servers by parsing MongoDB logs.
Shadowserver and Censys warn of a large exposed surface: more than 74,000 publicly accessible MongoDB instances may be vulnerable, and over 87,000 IPs show fingerprints of potentially unpatched versions.
CISA has directed Federal Civilian Executive Branch agencies to patch CVE-2025-14847 (MongoBleed) within three weeks, by January 19, 2026.
The vulnerability arises from MongoDB Server’s handling of network packets with zlib, enabling unauthenticated attackers to remotely exfiltrate credentials and other sensitive data with low effort and no user interaction.
Elastic researcher Joe Desimone released a proof-of-concept exploit for unpatched hosts, and Wiz notes that about 42% of visible systems host at least one vulnerable MongoDB instance, indicating a significant cloud impact.
Summary based on 1 source
Get a daily email with more Tech stories
Source

BleepingComputer • Dec 30, 2025
CISA orders feds to patch MongoBleed flaw exploited in attacks