Cyber Posture

CVE-2025-1756

HighLPE

Published: 27 February 2025

Published
27 February 2025
Modified
09 April 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0004 11.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1756 is a high-severity Untrusted Search Path (CWE-426) vulnerability in Mongodb Mongosh. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 11.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and CM-11 (User-installed Software).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring timely flaw remediation through upgrading mongosh to version 2.3.0 or later, eliminating the untrusted search path vulnerability.

prevent

Restricts user-installed software and prohibits placement of crafted malicious files in exploitable directories like C:\node_modules\, preventing the initial exploitation setup.

preventdetect

Deploys malicious code protection mechanisms to scan for and block execution of the crafted file loaded via the untrusted search path during privilege escalation attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

CVE-2025-1756 enables local privilege escalation in mongosh via a crafted file in C:\node_modules\, facilitating exploitation for privilege escalation.

NVD Description

mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privilege, when a crafted file is stored in C:\node_modules\. This issue affects mongosh prior to 2.3.0

Deeper analysisAI

CVE-2025-1756 is a local privilege escalation vulnerability in mongosh, affecting versions prior to 2.3.0. The flaw occurs under certain conditions when a crafted file is stored in C:\node_modules\, potentially enabling unauthorized actions on a user's system with elevated privileges. It is linked to CWE-426 (Untrusted Search Path) and carries a CVSS v3.1 base score of 7.5 (AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H), indicating high severity with local access required, high complexity, low privileges, and user interaction.

A local attacker with low privileges can exploit this vulnerability by placing a crafted file in the C:\node_modules\ directory. Exploitation demands high attack complexity and relies on user interaction, likely involving the execution of mongosh in an environment that loads the malicious file via an untrusted search path. Upon success, the attacker achieves privilege escalation, resulting in high impacts to confidentiality, integrity, and availability across the system's scope.

MongoDB's advisory at https://jira.mongodb.org/browse/MONGOSH-2028 and Red Hat's errata at https://access.redhat.com/errata/RHSA-2025:1756 detail the issue. Mitigation requires upgrading to mongosh 2.3.0 or later, which addresses the vulnerability.

Details

CWE(s)

Affected Products

mongodb
mongosh
≤ 2.3.0
redhat
codeready linux builder eus
9.4
redhat
codeready linux builder for arm64 eus
9.4_aarch64
redhat
codeready linux builder for ibm z systems eus
9.4_s390x
redhat
codeready linux builder for power little endian eus
9.4_ppc64le
redhat
enterprise linux update services for sap solutions
9.4
redhat
enterprise linux eus
9.4
redhat
enterprise linux for arm 64
9.4_aarch64
redhat
enterprise linux for arm 64 eus
9.4_aarch64
redhat
enterprise linux for ibm z systems
9.4_s390x
+3 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2025-1755Same product: Redhat Enterprise Linux For Arm 64
CVE-2026-29089Shared CWE-426
CVE-2026-3121Same vendor: Redhat
CVE-2026-4636Same vendor: Redhat
CVE-2026-32032Shared CWE-426
CVE-2025-0145Shared CWE-426
CVE-2025-24789Shared CWE-426
CVE-2026-24070Shared CWE-426
CVE-2026-35368Shared CWE-426
CVE-2025-21399Shared CWE-426

References