CVE-2025-14345 Affecting mongod-8.0-advanced-compat package, versions <8.0.16-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-MONGOD80ADVANCEDCOMPAT-14407178
  • published13 Dec 2025
  • disclosed9 Dec 2025

Introduced: 9 Dec 2025

CVE-2025-14345  (opens in a new tab)

How to fix?

Upgrade Minimos:latest mongod-8.0-advanced-compat to version 8.0.16-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mongod-8.0-advanced-compat package and not the mongod-8.0-advanced-compat package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

A post-authentication flaw in the network two-phase commit protocol used for cross-shard transactions in MongoDB Server may lead to logical data inconsistencies under specific conditions which are not predictable and exist for a very short period of time. This error can cause the transaction coordination logic to misinterpret the transaction as committed, resulting in inconsistent state on those shards. This may lead to low integrity and availability impact.

This issue impacts MongoDB Server v8.0 versions prior to 8.0.16, MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB server v8.2 versions prior to 8.2.2.

CVSS Base Scores

version 3.1