A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.
References
| Link | Resource |
|---|---|
| https://jira.mongodb.org/browse/SERVER-119319 |
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-17 16:16
Updated : 2026-03-18 14:52
NVD link : CVE-2026-4148
Mitre link : CVE-2026-4148
CVE.ORG link : CVE-2026-4148
JSON object : View
Products Affected
No product.
CWE
CWE-416
Use After Free
