Description
CVE-2025-14847, dubbed MongoBleed, is a high-severity memory disclosure vulnerability in MongoDB Server’s zlib decompression logic. It allows unauthenticated remote attackers to leak uninitialized heap memory, potentially exposing sensitive data like credentials and API keys.
Impact
Exploitation of CVE-2025-14847 allows unauthenticated remote attackers to read fragments of uninitialized heap memory from a vulnerable MongoDB Server instance. By sending specially crafted network packets that abuse mismatched length fields in zlib-compressed protocol headers, an attacker can cause the server to return portions of memory that were never intended to be exposed.
This can lead to the exposure of sensitive in-memory data, including database credentials, session tokens, and cloud access keys. Because the information is disclosed without authentication or user interaction, successful exploitation can enable follow-on attacks including unauthorized database access, lateral movement within cloud environments, and long-term credential compromise.
This vulnerability affects MongoDB Server deployments across multiple major versions and operating systems, including Linux, Windows, and macOS environments where MongoDB is deployed. Due to confirmed active exploitation in the wild, CISA has added CVE-2025-14847 to its Known Exploited Vulnerabilities catalog, indicating a high risk to unpatched systems exposed to untrusted network traffic.
CVE-2025-55182
Critical React vulnerability CVE-2025-55182 allows remote code execution. Update to patched versions immediately to secure affected React Server Components and frameworks.
Learn MoreCVE-2025-24201
CVE-2025-24201 is an out-of-bounds write vulnerability in WebKit, Apple's browser engine. Maliciously crafted web content could exploit this issue to break out of the Web Content sandbox, potentially leading to arbitrary code execution. Apple addressed this vulnerability by implementing improved che
Learn MoreCVE-2023-23533
CVE-2023-23533 is a logic issue within macOS that could allow an application to modify protected parts of the file system. According to Kandji's analysis, this vulnerability allowed an attacker to swap the installer package after the system verified its code signature. The system would then install
Learn More