CVE-2025-14847
Mismatched length fields in Zlib compressed protocol headers may allow

Publication date: 2025-12-19

Last updated on: 2025-12-19

Assigner: [email protected]

Description
Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Affected Vendors & Products
Vendor Product Version
mongodb mongodb_server 8.2
mongodb mongodb_server 3.6
mongodb mongodb_server 4.0
mongodb mongodb_server 8.0
mongodb mongodb_server 5.0
mongodb mongodb_server 4.4
mongodb mongodb_server 7.0
mongodb mongodb_server 4.2
mongodb mongodb_server 6.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-130 The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?


How can this vulnerability impact me? :


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart
Meta Information
CVE Publication Date:
2025-12-19
CVE Last Modified Date:
2025-12-19
Report Generation Date:
2026-01-05
AI Powered Q&A Generation:
2025-12-19
EPSS Last Evaluated Date:
2026-01-04
NVD Report Link: