nomisec
WORKING POC
34 stars
by Black1hp · poc
https://github.com/Black1hp/mongobleed-scanner
The repository contains a functional PoC scanner for CVE-2025-14847, a pre-authentication heap memory disclosure vulnerability in the MongoDB C++ Driver. The scanner exploits an out-of-bounds read in the handling of OP_COMPRESSED messages to detect vulnerable instances.
Classification
Working Poc | Scanner 95%
Target:
MongoDB C++ Driver
No auth needed
Prerequisites:
Network access to MongoDB instances · Python 3.x environment
nomisec
WORKING POC
25 stars
by cybertechajju · infoleak
https://github.com/cybertechajju/CVE-2025-14847_Expolit
This repository contains a Python-based exploit tool for CVE-2025-14847, a memory disclosure vulnerability in MongoDB's zlib compression handling. The tool allows for multi-threaded scanning, automatic vulnerability detection, and extraction of sensitive data from vulnerable MongoDB instances.
Classification
Working Poc 95%
Target:
MongoDB < 8.0.10, < 7.3.6, < 7.0.19, < 6.0.23
No auth needed
Prerequisites:
Network access to vulnerable MongoDB instance · Python 3.8+ environment
nomisec
WORKING POC
24 stars
by ProbiusOfficial · infoleak
https://github.com/ProbiusOfficial/CVE-2025-14847
This PoC exploits CVE-2025-14847, a MongoDB zlib compression vulnerability that allows unauthenticated remote heap memory leakage by sending a malformed OP_COMPRESSED packet with an exaggerated uncompressed size.
Classification
Working Poc 95%
Target:
MongoDB Server (versions 8.2.0-8.2.3, 8.0.0-8.0.16, 7.0.0-7.0.26, 6.0.0-6.0.26, 5.0.0-5.0.31, 4.4.0-4.4.29, and all 4.2, 4.0, 3.6)
No auth needed
Prerequisites:
Network access to MongoDB server with zlib compression enabled
nomisec
SCANNER
11 stars
by onewinner · infoleak
https://github.com/onewinner/CVE-2025-14847
This repository contains a Go-based scanner for detecting CVE-2025-14847, a MongoDB Zlib compression protocol memory leak vulnerability. It checks for vulnerable versions, Zlib support, and attempts to extract leaked heap memory data.
Classification
Scanner 95%
Target:
MongoDB (versions 3.6.x to 8.2.2)
No auth needed
Prerequisites:
Network access to MongoDB instance · Zlib compression enabled on target
nomisec
WORKING POC
9 stars
by Security-Phoenix-demo · infoleak
https://github.com/Security-Phoenix-demo/mongobleed-exploit-CVE-2025-14847
This repository contains a working PoC exploit for CVE-2025-14847, a critical unauthenticated memory disclosure vulnerability in MongoDB's network transport layer. The exploit leverages a flaw in zlib decompression to leak sensitive heap memory, including credentials and internal server state.
Classification
Working Poc 95%
Target:
MongoDB Server (versions 4.4.0-4.4.29, 5.0.0-5.0.31, 6.0.0-6.0.26, 7.0.0-7.0.27, 8.0.0-8.0.16, 8.2.0-8.2.2)
No auth needed
Prerequisites:
Network access to vulnerable MongoDB instance · MongoDB instance with zlib compression enabled
nomisec
SUSPICIOUS
4 stars
by chinaxploiter · poc
https://github.com/chinaxploiter/CVE-2025-14847-PoC
The repository contains an obfuscated Python script using PyArmor, which is unusual for a legitimate PoC. The script is heavily encrypted, making it difficult to verify its true purpose or functionality.
Classification
Suspicious 80%
Target:
unknown
No auth needed
Prerequisites:
unknown
github
WORKING POC
4 stars
by ctkqiang · gopoc
https://github.com/ctkqiang/CVE-Exploits/tree/main/CVE-2025-14847
This repository contains a functional exploit for CVE-2025-14847, a MongoDB zLib memory leak vulnerability. The exploit constructs malicious OP_COMPRESSED packets to trigger memory disclosure by manipulating the claimed uncompressed size field.
Classification
Working Poc 95%
Target:
MongoDB (versions 4.2-8.2 with zlib compression enabled)
No auth needed
Prerequisites:
MongoDB with zlib network compression enabled · network access to MongoDB port (default 27017)
nomisec
WORKING POC
3 stars
by joshuavanderpoll · infoleak
https://github.com/joshuavanderpoll/CVE-2025-14847
This PoC exploits CVE-2025-14847 (MongoBleed), a heap memory disclosure vulnerability in MongoDB Server. It sends crafted zlib-compressed OP_MSG packets with inflated document lengths to leak uninitialized heap memory, revealing sensitive information.
Classification
Working Poc 95%
Target:
MongoDB Server (versions 5.0.0-5.0.31, 6.0.0-6.0.26, 7.0.0-7.0.27, 8.0.0-8.0.16, 8.2.0-8.2.2)
No auth needed
Prerequisites:
Network access to MongoDB server · MongoDB server running a vulnerable version
nomisec
WORKING POC
2 stars
by franksec42 · infoleak
https://github.com/franksec42/mongobleed-exploit-CVE-2025-14847
The repository contains a functional exploit for CVE-2025-14847 (MongoBleed), which allows unauthenticated remote attackers to exfiltrate uninitialized heap memory from MongoDB servers via a flaw in zlib decompression logic. The exploit includes a lab environment, network scanner, and code scanner for vulnerability detection.
Classification
Working Poc 95%
Target:
MongoDB Server (versions 4.4.0-4.4.29, 5.0.0-5.0.31, 6.0.0-6.0.26, 7.0.0-7.0.27, 8.0.0-8.0.16, 8.2.0-8.2.2)
No auth needed
Prerequisites:
Network access to vulnerable MongoDB instance · MongoDB instance with zlib compression enabled
nomisec
WORKING POC
2 stars
by nma-io · infoleak
https://github.com/nma-io/mongobleed
This Go-based PoC exploits CVE-2025-14847, a memory leak vulnerability in MongoDB, by sending crafted probes to extract sensitive data from server memory. It includes both scanning and targeted attack modes to leak field names, types, and raw memory contents.
Classification
Working Poc 95%
Target:
MongoDB (version not specified in code)
No auth needed
Prerequisites:
Network access to MongoDB server · MongoDB server vulnerable to CVE-2025-14847
nomisec
WORKING POC
2 stars
by alexcyberx · infoleak
https://github.com/alexcyberx/CVE-2025-14847_Expolit
This repository contains a Python-based exploit tool for CVE-2025-14847, a memory disclosure vulnerability in MongoDB's zlib compression handling. The tool allows for multi-threaded scanning, secret pattern detection, and data export.
Classification
Working Poc 95%
Target:
MongoDB < 8.0.10, < 7.3.6, < 7.0.19, < 6.0.23
No auth needed
Prerequisites:
Network access to vulnerable MongoDB instance
nomisec
WORKING POC
1 stars
by waheeb71 · infoleak
https://github.com/waheeb71/CVE-2025-14847
This is a functional PoC exploit for CVE-2025-14847, a memory leak vulnerability in MongoDB. It leverages a zlib decompression bug to leak server memory via crafted BSON payloads with inflated document lengths.
Classification
Working Poc 95%
Target:
MongoDB (version not specified)
No auth needed
Prerequisites:
Network access to MongoDB port (default 27017) · Python 3.x
nomisec
WORKING POC
1 stars
by sho-luv · infoleak
https://github.com/sho-luv/MongoBleed
This repository contains a functional PoC for CVE-2025-14847, an unauthenticated memory leak in MongoDB's zlib decompression. The toolkit includes a CLI scanner, exploitation scripts, and a lab environment for testing.
Classification
Working Poc 95%
Target:
MongoDB (versions 4.4.29, 6.0.26, 8.0.16)
No auth needed
Prerequisites:
Network access to MongoDB instance · zlib compression enabled on target
nomisec
WORKING POC
1 stars
by FurkanKAYAPINAR · poc
https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit
This repository contains a functional exploit for CVE-2025-14847, an unauthenticated memory-leak vulnerability in MongoDB Server's zlib compression handling. The exploit leverages inconsistent length fields in OP_COMPRESSED messages to leak uninitialized heap memory, potentially exposing sensitive data like authentication tokens, passwords, and PII.
Classification
Working Poc 95%
Target:
MongoDB Server versions 4.4.0-4.4.29, 5.0.0-5.0.31, 6.0.0-6.0.26, 7.0.0-7.0.26, 8.0.0-8.0.16, 8.2.0-8.2.2
No auth needed
Prerequisites:
Network access to MongoDB server · MongoDB server with zlib compression enabled
nomisec
WRITEUP
1 stars
by AdolfBharath · infoleak
https://github.com/AdolfBharath/mongobleed
This repository is an educational lab demonstrating the conceptual vulnerability behind CVE-2025-14847, focusing on MongoDB's compression framing and size-metadata mismatches. It includes a safe, non-exploitable probe to illustrate how such issues could lead to memory disclosure in buggy implementations.
Classification
Writeup 100%
Target:
MongoDB (conceptual, no specific version targeted)
No auth needed
Prerequisites:
Docker · Python 3.10+
nomisec
WORKING POC
1 stars
by NoNameError · remote
https://github.com/NoNameError/MongoBLEED---CVE-2025-14847-POC-
This PoC exploits CVE-2025-14847 (MongoBLEED) by sending a maliciously crafted OP_COMPRESSED packet to trigger a heap memory leak in MongoDB. The script forges a decompression size field to leak adjacent heap memory, demonstrating the vulnerability.
Classification
Working Poc 95%
Target:
MongoDB (version not specified)
No auth needed
Prerequisites:
Python 3.x · Network access to target on port 27017
nomisec
WORKING POC
1 stars
by InfoSecAntara · poc
https://github.com/InfoSecAntara/CVE-2025-14847-MongoDB
This repository contains a Python-based proof-of-concept exploit for CVE-2025-14847, a memory disclosure vulnerability in MongoDB's BSON decompression implementation. The tool demonstrates how improper bounds checking can lead to memory leaks by sending crafted BSON documents with inflated lengths.
Classification
Working Poc 95%
Target:
MongoDB 4.4+
No auth needed
Prerequisites:
Network access to target MongoDB instance · Python 3.8+
nomisec
WORKING POC
1 stars
by lincemorado97 · infoleak
https://github.com/lincemorado97/CVE-2025-14847
This is a functional PoC exploit for CVE-2025-14847, a MongoDB unauthenticated memory-leak vulnerability. It crafts a malicious OP_COMPRESSED packet with an inflated uncompressed size to trigger a zlib decompression flaw, leaking uninitialized server memory via BSON parsing.
Classification
Working Poc 95%
Target:
MongoDB >= 4.4
No auth needed
Prerequisites:
Python >= 3.8 · Network access to vulnerable MongoDB instance
nomisec
WORKING POC
1 stars
by peakcyber-security · infoleak
https://github.com/peakcyber-security/CVE-2025-14847
This repository contains a functional proof-of-concept exploit for CVE-2025-14847 (MongoBleed), which allows unauthorized heap memory reads from MongoDB servers without authentication. The exploit crafts malformed BSON payloads to trigger memory leaks and extracts sensitive data from error responses.
Classification
Working Poc 95%
Target:
MongoDB (version not specified, but fixed in commit 505b660a14698bd2b5233bd94da3917b585c5728)
No auth needed
Prerequisites:
Network access to MongoDB port (default 27017) · Vulnerable MongoDB instance
nomisec
WORKING POC
by 14mb1v45h · poc
https://github.com/14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026
This repository contains a Python-based scanner for detecting exposed MongoDB instances and checking for CVE-2025-14847 (MongoBleed), a heap leak vulnerability via OP_COMPRESSED. The tool includes checks for open ports, unauthenticated access, and a PoC for the vulnerability.
Classification
Working Poc 90%
Target:
MongoDB (version not specified)
No auth needed
Prerequisites:
Network access to target MongoDB instance · Python environment with pymongo library
nomisec
SCANNER
by pedrocruz2202 · poc
https://github.com/pedrocruz2202/mongobleed-scanner
This repository contains a scanner for CVE-2025-14847, a MongoDB heap memory leak vulnerability. The Python script sends malformed packets to detect vulnerable instances and logs results.
Classification
Scanner 90%
Target:
MongoDB (version not specified)
No auth needed
Prerequisites:
Network access to MongoDB instance · Python 3.x environment
nomisec
WORKING POC
by tunahantekeoglu · poc
https://github.com/tunahantekeoglu/MongoDeepDive
MongoDeepDive is a high-performance asynchronous scanner and forensic analyzer for CVE-2025-14847, leveraging Shannon Entropy to detect uninitialized memory leaks in MongoDB servers. It distinguishes between low-entropy padding and high-value secrets like keys or tokens.
Classification
Working Poc 95%
Target:
MongoDB (version not specified)
No auth needed
Prerequisites:
Network access to MongoDB server · MongoDB server vulnerable to CVE-2025-14847
nomisec
WORKING POC
by ElJoamy · poc
https://github.com/ElJoamy/MongoBleed-exploit
This repository contains a functional PoC exploit for CVE-2025-14847 (MongoBleed), demonstrating an unauthenticated memory leak vulnerability in MongoDB's OP_COMPRESSED wire protocol handling. The exploit sends maliciously crafted compressed messages to trigger memory leaks, allowing extraction of sensitive data from the server's memory.
Classification
Working Poc 95%
Target:
MongoDB 6.0.x < 6.0.27, 7.0.x < 7.0.28, 8.0.x < 8.0.17
No auth needed
Prerequisites:
Docker · Python 3 · Network access to vulnerable MongoDB instance
nomisec
WRITEUP
by Rishi-kaul · poc
https://github.com/Rishi-kaul/CVE-2025-14847-MongoBleed
CVE-2025-14847 (MongoBleed) is a high-severity information disclosure vulnerability in MongoDB Server, allowing remote, unauthenticated attackers to leak sensitive data from server memory by exploiting improper handling of zlib-compressed network messages.
Classification
Writeup 90%
Target:
MongoDB Server (versions prior to 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, 4.4.30)
No auth needed
Prerequisites:
Network access to MongoDB server · zlib compression enabled (default configuration)
nomisec
WRITEUP
by JemHadar · poc
https://github.com/JemHadar/MongoBleed-DFIR-Triage-Script-CVE-2025-14847
This repository provides a DFIR triage script for detecting and analyzing exploitation attempts of CVE-2025-14847 (MongoBleed), focusing on artifact collection and forensic analysis. It includes references to PoC code and research but does not contain exploit code itself.
Classification
Writeup 100%
Target:
MongoDB
No auth needed
Prerequisites:
Access to MongoDB logs and configuration · Optional: `jq` for on-host analysis
nomisec
SCANNER
by keraattin · poc
https://github.com/keraattin/Mongobleed-Detector-CVE-2025-14847
This repository contains a scanner for CVE-2025-14847 (MongoBleed), a memory leak vulnerability in MongoDB's zlib compression handling. The scanner detects vulnerable MongoDB instances by checking version and zlib compression status.
Classification
Scanner 100%
Target:
MongoDB versions 4.4.0-4.4.29, 5.0.0-5.0.31, 6.0.0-6.0.26, 7.0.0-7.0.27, 8.0.0-8.0.16, 8.2.0-8.2.2
No auth needed
Prerequisites:
Network access to MongoDB port (default: 27017)
nomisec
WRITEUP
by zaryouhashraf · poc
https://github.com/zaryouhashraf/CVE-2025-14847
This repository provides a detailed technical analysis of CVE-2025-14847, a high-severity unauthenticated memory disclosure vulnerability in MongoDB Server. It includes root cause analysis, affected versions, exploitation details, and remediation guidance.
Classification
Writeup 95%
Target:
MongoDB Server (versions 3.6.x, 4.0.x, 4.2.x, 4.4.0-4.4.29, 5.0.0-5.0.31, 6.0.0-6.0.26, 7.0.0-7.0.26, 8.0.0-8.0.16, 8.2.0-8.2.2)
No auth needed
Prerequisites:
Network access to MongoDB Server · Crafted compressed protocol packets
nomisec
WORKING POC
by sakthivel10q · infoleak
https://github.com/sakthivel10q/CVE-2025-14847
This PoC exploits CVE-2025-14847 (MongoBleed) to leak information from MongoDB by manipulating BSON document lengths and buffer offsets in OP_COMPRESSED messages. It iterates through document lengths to trigger memory leaks and extracts field names from error responses.
Classification
Working Poc 90%
Target:
MongoDB (version not specified)
No auth needed
Prerequisites:
Network access to MongoDB port (default 27017) · MongoDB instance vulnerable to CVE-2025-14847
nomisec
WORKING POC
by KingHacker353 · infoleak
https://github.com/KingHacker353/CVE-2025-14847_Expolit
This is a working exploit for CVE-2025-14847, targeting MongoDB with a memory leak vulnerability. It includes functionality to probe targets, extract leaked data, and scan for secrets.
Classification
Working Poc 90%
Target:
MongoDB
No auth needed
Prerequisites:
Network access to MongoDB instance · MongoDB instance vulnerable to CVE-2025-14847
nomisec
WORKING POC
by saereya · infoleak
https://github.com/saereya/CVE-2025-14847---MongoBleed
This is a Go-based proof-of-concept exploit for CVE-2025-14847, a MongoDB memory disclosure vulnerability. It crafts malformed BSON documents with inflated lengths, compresses them, and sends them via the MongoDB wire protocol to leak uninitialized memory from the server.
Classification
Working Poc 95%
Target:
MongoDB (specific versions prior to patch)
No auth needed
Prerequisites:
Network access to MongoDB port (default 27017) · Vulnerable MongoDB version
nomisec
WORKING POC
by kuyrathdaro · infoleak
https://github.com/kuyrathdaro/cve-2025-14847
MongoBleed is a Python-based tool that exploits CVE-2025-14847, a memory leak vulnerability in MongoDB's zlib decompression logic, allowing unauthenticated remote attackers to leak uninitialized heap memory fragments. The PoC demonstrates the flaw by sending crafted OP_COMPRESSED messages with mismatched length fields.
Classification
Working Poc 95%
Target:
MongoDB versions 8.2.x < 8.2.3, 8.0.x < 8.0.17, 7.0.x < 7.0.28, 6.0.x < 6.0.27, 5.0.x < 5.0.32, 4.4.x < 4.4.30, and all 3.6.x, 4.0.x, and 4.2.x
No auth needed
Prerequisites:
Network access to vulnerable MongoDB instance · Python 3.8+ environment
nomisec
WORKING POC
by vfa-tuannt · infoleak
https://github.com/vfa-tuannt/CVE-2025-14847
This repository contains a proof-of-concept exploit for CVE-2025-14847, a critical MongoDB vulnerability that allows unauthenticated remote heap memory leakage via malformed OP_COMPRESSED packets. The PoC demonstrates the exploit by sending a crafted packet to leak uninitialized heap memory.
Classification
Working Poc 95%
Target:
MongoDB Server (versions 8.2.0-8.2.3, 8.0.0-8.0.16, 7.0.0-7.0.26, 6.0.0-6.0.26, 5.0.0-5.0.31, 4.4.0-4.4.29, and all v4.2, v4.0, v3.6)
No auth needed
Prerequisites:
Network access to MongoDB server with zlib compression enabled
nomisec
SCANNER
by Systemhaus-Schulz · infoleak
https://github.com/Systemhaus-Schulz/MongoBleed-CVE-2025-14847
This repository contains a vulnerability scanner for CVE-2025-14847 (MongoBleed), a MongoDB memory disclosure vulnerability. The tool uses PoC-accurate probing to detect memory leaks without requiring authentication or causing destructive behavior.
Classification
Scanner 95%
Target:
MongoDB (specific version not specified)
No auth needed
Prerequisites:
Network access to the target MongoDB instance · MongoDB instance running a vulnerable version
nomisec
SCANNER
by CadGoose · infoleak
https://github.com/CadGoose/MongoBleed-CVE-2025-14847-Fully-Automated-scanner
This is a scanner for MongoDB instances and CVE-2025-14847, focusing on advanced discovery techniques and WAF/CDN bypasses to identify origin servers. It does not contain exploit code but rather reconnaissance and detection capabilities.
Classification
Scanner 90%
Target:
MongoDB (version not specified)
No auth needed
Prerequisites:
Kali Linux tools (nmap, subfinder, fping, shodan CLI) · Python libraries (dnspython, requests, urllib3) · Optional API keys for Shodan, Censys, SecurityTrails
nomisec
WORKING POC
by im-hanzou · infoleak
https://github.com/im-hanzou/mongobleed
This is a functional exploit for CVE-2025-14847, targeting a heap buffer over-read vulnerability in MongoDB's OP_COMPRESSED handler. It leaks heap memory by manipulating the uncompressed_size field, causing the BSON parser to read beyond message boundaries.
Classification
Working Poc 95%
Target:
MongoDB (version not specified, likely multiple versions affected)
No auth needed
Prerequisites:
Network access to MongoDB instance · MongoDB instance with vulnerable OP_COMPRESSED handler
nomisec
WORKING POC
by sahar042 · infoleak
https://github.com/sahar042/CVE-2025-14847
This PoC exploits CVE-2025-14847 (MongoBleed) by sending malformed OP_COMPRESSED messages to MongoDB, triggering an information leak via error responses. It probes for leaked field names and BSON types, potentially exposing sensitive data.
Classification
Working Poc 95%
Target:
MongoDB (version not specified)
No auth needed
Prerequisites:
Network access to MongoDB port (default 27017) · MongoDB instance vulnerable to CVE-2025-14847
nomisec
SCANNER
by amnnrth · infoleak
https://github.com/amnnrth/CVE-2025-14847
This repository contains a Python-based scanner for detecting unauthenticated MongoDB instances exposed via CVE-2025-14847. The script sends a MongoDB 'hello' packet to target hosts and checks for responses indicating unauthenticated access.
Classification
Scanner 95%
Target:
MongoDB (version not specified)
No auth needed
Prerequisites:
Python 3.9+ · Network access to target hosts · List of target hosts/ports
nomisec
WORKING POC
by j0lt-github · infoleak
https://github.com/j0lt-github/mongobleedburp
This is a Burp Suite extension designed to detect and exploit CVE-2025-14847 (MongoBleed), a vulnerability in MongoDB that allows out-of-bounds memory leaks. The tool includes a manual test UI for sending crafted BSON payloads and analyzing leaked memory content.
Classification
Working Poc 95%
Target:
MongoDB (version not specified)
No auth needed
Prerequisites:
Network access to MongoDB instance · MongoDB instance vulnerable to CVE-2025-14847
nomisec
SUSPICIOUS
by sakthivel10q · poc
https://github.com/sakthivel10q/sakthivel10q.github.io
The repository lacks actual exploit code and instead directs users to download external releases. It uses vague marketing language without technical details about CVE-2025-14847 or MongoDB vulnerabilities.
Classification
Suspicious 95%
Target:
MongoDB
No auth needed
Prerequisites:
none specified
nomisec
SUSPICIOUS
by pedrocruz2202 · poc
https://github.com/pedrocruz2202/pedrocruz2202.github.io
The repository claims to provide a scanner for CVE-2025-14847 but contains no actual exploit code or technical details. It directs users to download an external release, which is a common tactic for malicious or deceptive repositories.
Classification
Suspicious 95%
Target:
MongoDB (version not specified)
No auth needed
Prerequisites:
MongoDB instance to scan
nomisec
WRITEUP
by 0xAshwesker · poc
https://github.com/0xAshwesker/CVE-2025-14847
This repository provides a detailed technical analysis of CVE-2025-14847, a high-severity unauthenticated memory disclosure vulnerability in MongoDB Server. It includes root cause analysis, affected versions, exploitation details, and remediation guidance.
Classification
Writeup 100%
Target:
MongoDB Server (versions 3.6.x, 4.0.x, 4.2.x, 4.4.0-4.4.29, 5.0.0-5.0.31, 6.0.0-6.0.26, 7.0.0-7.0.26, 8.0.0-8.0.16, 8.2.0-8.2.2)
No auth needed
Prerequisites:
Network access to MongoDB Server · Crafted compressed protocol packets
metasploit
WORKING POC
by Alexander Hagenah, Diego Ledda, Joe Desimone · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/mongodb/cve_2025_14847_mongobleed.rb
This Metasploit module exploits CVE-2025-14847, a memory disclosure vulnerability in MongoDB's zlib decompression handling. It sends crafted OP_COMPRESSED messages to leak server memory contents, which may include sensitive data like credentials or encryption keys.
Classification
Working Poc 95%
Target:
MongoDB (versions affected by CVE-2025-14847)
No auth needed
Prerequisites:
Network access to MongoDB port (default 27017) · zlib compression enabled on the server
vulncheck_xdb
WORKING POC
infoleak
https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoDB
This repository contains a functional exploit for CVE-2025-14847, a critical unauthenticated memory-leak vulnerability in MongoDB Server's zlib compression handling. The exploit demonstrates the vulnerability by leaking uninitialized heap memory, which may include sensitive data such as authentication tokens, passwords, and PII.
Classification
Working Poc 95%
Target:
MongoDB Server (versions 4.4.0-4.4.29, 5.0.0-5.0.31, 6.0.0-6.0.26, 7.0.0-7.0.26, 8.0.0-8.0.16, 8.2.0-8.2.2)
No auth needed
Prerequisites:
Network access to MongoDB server with zlib compression enabled