CVE-2025-11575
BaseFortify
Publication date: 2025-10-23
Last updated on: 2025-10-27
Assigner: MongoDB, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mongodb | mongodb_sql_odbc_driver | * |
| mongodb | mongodb_sql_odbc_driver | 2.0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-276 | During installation, installed file permissions are set to allow anyone to modify those files. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-11575 is a local privilege escalation vulnerability in the MongoDB Atlas SQL ODBC driver on Windows. It occurs due to incorrect default permissions during installation, which could allow a local user to gain higher privileges than intended. This issue affects versions from 1.0.0 through 2.0.0 and was fixed in version 2.0.1 by correcting the permissions for custom installation paths. [1]
How can this vulnerability impact me? :
This vulnerability can allow a local user on a Windows system to escalate their privileges, potentially gaining administrative or higher-level access. This could lead to unauthorized actions, such as modifying system settings, accessing sensitive data, or installing malicious software. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking the version of the MongoDB Atlas SQL ODBC driver installed on your Windows system. Versions from 1.0.0 through 2.0.0 are affected. Additionally, you can inspect the permissions of the installation directories to see if they are improperly set, which could allow privilege escalation. Specific commands are not provided in the resources. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update the MongoDB Atlas SQL ODBC driver to version 2.0.1 or later, which fixes the incorrect default permissions issue. This update corrects permissions for custom installation paths to prevent local privilege escalation. [1]