MongoDB CVE-2025-14847
Backgound
The vulnerability (CVE-2025-14847) in MongoDB’s zlib implementation allows unauthenticated remote exploitation, enabling extraction of sensitive data from MongoDB server memory without login credentials.
Products affected:
The affected versions are opHA MB (Message Bus) are as follows:
- opHA MB 5.0.1
- opHA MB 5.1.0
- opHA MB 5.1.1
- opHA MB 5.1.2
- opHA MB 5.1.3
- opHA MB with replication
MongoDB Patching
To mitigate the "MongoBleed" vulnerability (CVE-2025-14847), it is recommended to immediately Patch MongoDB to remediate the CVE or, as a temporary workaround
Immediate Mitigation Steps
Patch MongoDB: Apply the relevant patch for your version as soon as possible:
- 8.2.x: Upgrade to 8.2.3 or newer
- 8.0.x: Upgrade to 8.0.17 or newer
- 7.0.x: Upgrade to 7.0.28 or newer
- 6.0.x: Upgrade to 6.0.27 or newer
- 5.0.x: Upgrade to 5.0.32 or newer
- 4.4.x: Upgrade to 4.4.30 or newer
Note: Versions 4.2, 4.0, and 3.6 are no longer supported and do not have a patch; upgrading to a supported version is mandatory.
MongoDB patched binary can be downloaded from https://www.mongodb.com/try/download/community-edition/releases
If immediate upgrade is not possible, a Temporary Workarounds can be applied.
Temporary Workarounds
If the MongoDB servers is Internet accessible, then you can restrict the MongoDB access.
To mitigate the risk a workarounds is available:
Restrict Network Access:
Ensure your MongoDB database ports (default 27017) are not exposed to the public internet.
Use firewalls, security groups, or Kubernetes NetworkPolicies to limit connectivity to only trusted, internal IPs and application servers.
The vulnerability is "pre-auth," meaning an attacker can exploit it before authentication, so network isolation is a critical defense.
Disable zlib Compression:
The vulnerability lies in how MongoDB handles zlib compression. Disabling it mitigates the risk.
Start
mongodormongoswith thenetworkMessageCompressorsornet.compression.compressorsoption, explicitly omittingzliband using alternatives likesnappyorzstd.head /etc/mongod.conf net: compression: compressors: zstd,snappy
If MongoDB is restricted to localhost, this does not apply.
MongoDB's configuration is in /etc/mongod.conf. To check if remote access is enabled, look for the value assigned to ‘bindIp’ under the ‘net’ section.
If this value is localhost or 127.0.0.1, MongoDB is bound to localhost and poses no immediate concern.
net:
port: 27017
bindIp: 127.0.0.1However if bindIp is anything OTHER than localhost or 127.0.0.1, the MongoDB server needs to be patched
net:
port: 27017
bindIp: 0.0.0.0
Note that NMIS8 and NMIS9 are not affected because MongoDB binds to localhost by default. Verify this by checking bindIp in /etc/mongod.conf as described above.