DESCRIPTION LAST UPDATED: 2025-12-29
DEFAULT SEVERITY LEVEL: HIGH
This report identifies hosts that have the MongoDB NoSQL database running on port 27017/TCP and accessible on the Internet.
MONGOBLEED: We added tagging for MongoDB CVE-2025-14847. (Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client). For advisory, affected versions, and patch details see https://jira.mongodb.org/browse/SERVER-115508. This vulnerability is known exploited in the wild. Our check is version based (false positives due to backporting may be possible – if you receive a report that you believe is a false positive, please let us know). Tagged as cve-2025-14847. Severity is set to CRITICAL.[tagging added 2025-12-29]
While authentication is available for MongoDB, in many instances this authentication is not enabled. We tag MongoDB with no authentication as mongodb-noauth
- Our initial probe tests to see if MongoDB is accessible on the Internet and collecting the system information that it discloses.
- A secondary probe is then performed to determine if a list of databases can be obtained. If an error message is generated in response to this probe, the “visible_databases” field will say “none visible”, but if no error message is generated (indicating that no authentication is in use), the “visible_databases” field will list the first five databases that were returned.
For information on how to configure your MongoDB instance securely, please consult the MongoDB Security Checklist.
Track latest MongoDB exposure on our Dashboard.
Severity levels are described here.
For more information on our scanning efforts, check out our Internet scanning summary page..
Filename(s): scan_mongodb, scan6_mongodb