{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T05:52:10.493","vulnerabilities":[{"cve":{"id":"CVE-2025-1693","sourceIdentifier":"cna@mongodb.com","published":"2025-02-27T13:15:11.563","lastModified":"2025-09-22T16:39:57.180","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The MongoDB Shell may be susceptible to control character injection where an attacker with control over the database cluster contents can inject control characters into the shell output. This may result in the display of falsified messages that appear to originate from mongosh or the underlying operating system, potentially misleading users into executing unsafe actions.\n\n\nThe vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.\n\n\nThis issue affects mongosh versions prior to 2.3.9"},{"lang":"es","value":"El shell de MongoDB puede ser susceptible a la inyección de caracteres de control, en cuyo caso un atacante con control sobre el contenido del clúster de la base de datos puede inyectar caracteres de control en la salida del shell. Esto puede provocar la visualización de mensajes falsificados que parecen originarse en mongosh o en el sistema operativo subyacente, lo que puede inducir a error a los usuarios para que ejecuten acciones inseguras. La vulnerabilidad solo se puede explotar cuando mongosh está conectado a un clúster que está controlado parcial o totalmente por un atacante. Este problema afecta a las versiones de mongosh anteriores a la 2.3.9."}],"metrics":{"cvssMetricV31":[{"source":"cna@mongodb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L","baseScore":3.9,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":0.5,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.2}]},"weaknesses":[{"source":"cna@mongodb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-150"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mongodb:mongosh:*:*:*:*:*:*:*:*","versionEndExcluding":"2.3.9","matchCriteriaId":"A1799B29-2838-4948-BD93-2D8611DB9620"}]}]}],"references":[{"url":"https://jira.mongodb.org/browse/MONGOSH-2026","source":"cna@mongodb.com","tags":["Issue Tracking","Vendor Advisory"]}]}}]}