{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T13:36:22.421","vulnerabilities":[{"cve":{"id":"CVE-2021-32050","sourceIdentifier":"cna@mongodb.com","published":"2023-08-29T16:15:08.423","lastModified":"2025-11-03T20:15:47.443","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.\n\nWithout due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).\n\nThis issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0)."},{"lang":"es","value":"Algunos controladores de MongoDB pueden publicar erróneamente eventos que contienen datos relacionados con la autenticación a un oyente de comandos configurado por una aplicación. Los eventos publicados pueden contener datos sensibles a la seguridad cuando se ejecutan comandos específicos relacionados con la autenticación.\n\nSin la debida precaución, una aplicación puede exponer inadvertidamente esta información sensible, por ejemplo, escribiéndola en un archivo de registro. Este problema solo surge si una aplicación habilita la función de oyente de comandos (esto no está habilitado por defecto).\n\nEste problema afecta al controlador MongoDB C 1.0.0 anterior a 1.17.7, al controlador MongoDB PHP 1.0.0 anterior a 1.9.2, al controlador MongoDB Swift 1.0.0 anterior a 1.1.1, al controlador MongoDB Node.js 3.6 anterior a 3.6.10, al controlador MongoDB Node.js 4.0 anterior a 4.17.0 y al controlador MongoDB Node.js 5.0 anterior a 5.8.0. Este problema también afecta a los usuarios del controlador MongoDB C++ dependientes del controlador C 1.0.0 anterior a 1.17.7 (controlador C++ anterior a 3.7.0)."}],"metrics":{"cvssMetricV31":[{"source":"cna@mongodb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N","baseScore":4.2,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":0.6,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"cna@mongodb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-532"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mongodb:c\\+\\+:*:*:*:*:*:mongodb:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.17.7","matchCriteriaId":"09486555-7473-46FA-B646-E6AA6ECB005F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.17.7","matchCriteriaId":"FCB74F72-5943-472D-A787-363B6B6AAC45"},{"vulnerable":true,"criteria":"cpe:2.3:a:mongodb:node.js:*:*:*:*:*:mongodb:*:*","versionStartIncluding":"3.6","versionEndExcluding":"3.6.10","matchCriteriaId":"AD1E66B4-D728-41EE-8D61-967D411BA260"},{"vulnerable":true,"criteria":"cpe:2.3:a:mongodb:node.js:*:*:*:*:*:mongodb:*:*","versionStartIncluding":"4.0","versionEndExcluding":"4.17.0","matchCriteriaId":"9DE0FDB0-1227-465E-9F95-F3689BBD5C74"},{"vulnerable":true,"criteria":"cpe:2.3:a:mongodb:node.js:*:*:*:*:*:mongodb:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.8.0","matchCriteriaId":"0C560F25-FF53-437A-8D60-FB5CC356AE60"},{"vulnerable":true,"criteria":"cpe:2.3:a:mongodb:php_driver:*:*:*:*:*:mongodb:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.9.2","matchCriteriaId":"1284F2B7-7338-4796-B993-9FB547DC2869"},{"vulnerable":true,"criteria":"cpe:2.3:a:mongodb:swift_driver:*:*:*:*:*:mongodb:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.1.1","matchCriteriaId":"89AA28DB-8B7B-46FC-9DDB-8912BD6EA26D"}]}]}],"references":[{"url":"https://jira.mongodb.org/browse/CDRIVER-3797","source":"cna@mongodb.com","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://jira.mongodb.org/browse/CXX-2028","source":"cna@mongodb.com","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://jira.mongodb.org/browse/NODE-3356","source":"cna@mongodb.com","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://jira.mongodb.org/browse/PHPC-1869","source":"cna@mongodb.com","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://jira.mongodb.org/browse/SWIFT-1229","source":"cna@mongodb.com","tags":["Issue Tracking"]},{"url":"https://security.netapp.com/advisory/ntap-20231006-0001/","source":"cna@mongodb.com"},{"url":"https://jira.mongodb.org/browse/CDRIVER-3797","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://jira.mongodb.org/browse/CXX-2028","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://jira.mongodb.org/browse/NODE-3356","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://jira.mongodb.org/browse/PHPC-1869","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://jira.mongodb.org/browse/SWIFT-1229","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00027.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.netapp.com/advisory/ntap-20231006-0001/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}