CVE-2025-6710 Affecting mongod-8.0-advanced-compat package, versions <8.0.6-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-MONGOD80ADVANCEDCOMPAT-13329838
  • published6 Oct 2025
  • disclosed26 Jun 2025

Introduced: 26 Jun 2025

CVE-2025-6710  (opens in a new tab)

How to fix?

Upgrade Minimos:latest mongod-8.0-advanced-compat to version 8.0.6-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mongod-8.0-advanced-compat package and not the mongod-8.0-advanced-compat package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

MongoDB Server may be susceptible to stack overflow due to JSON parsing mechanism, where specifically crafted JSON inputs may induce unwarranted levels of recursion, resulting in excessive stack space consumption. Such inputs can lead to a stack overflow that causes the server to crash which could occur pre-authorisation. This issue affects MongoDB Server v7.0 versions prior to 7.0.17 and MongoDB Server v8.0 versions prior to 8.0.5.

The same issue affects MongoDB Server v6.0 versions prior to 6.0.21, but an attacker can only induce denial of service after authenticating.