Metrics
Affected Vendors & Products
| Link | Providers |
|---|---|
| https://jira.mongodb.org/browse/SERVER-120668 |
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mongodb
Mongodb mongodb Mongodb mongodb Server |
|
| Vendors & Products |
Mongodb
Mongodb mongodb Mongodb mongodb Server |
Wed, 13 May 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Using a densely populated chars mask and a large input string in the MongoDB aggregation operators $trim, $ltrim, and $rtrim, an authenticated user with aggregation permissions can pin CPU utilization at 100% for an extended period of time. This issue impacts MongoDB Server v7.0 versions prior to 7.0.34, v8.0 versions prior to 8.0.23, v8.2 versions prior to 8.2.9 and v8.3 versions prior to 8.3.2. | |
| Title | Post-authentication CPU utilization DoS via $trim/$ltrim/$rtrim operators | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mongodb
Published:
Updated: 2026-05-13T01:38:09.751Z
Reserved: 2026-05-08T23:43:11.551Z
Link: CVE-2026-8202
Updated: 2026-05-13T01:38:05.952Z
Status : Undergoing Analysis
Published: 2026-05-13T04:17:42.037
Modified: 2026-05-13T15:34:29.847
Link: CVE-2026-8202
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:35:04Z