CVE-2021-32050

4.2 MEDIUM
Published: August 29, 2023 Modified: November 03, 2025

Description

Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed. Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default). This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://jira.mongodb.org/browse/CDRIVER-3797
Source: cna@mongodb.com
Issue Tracking Patch Vendor Advisory
https://jira.mongodb.org/browse/CXX-2028
Source: cna@mongodb.com
Issue Tracking Patch Vendor Advisory
https://jira.mongodb.org/browse/NODE-3356
Source: cna@mongodb.com
Issue Tracking Patch Vendor Advisory
https://jira.mongodb.org/browse/PHPC-1869
Source: cna@mongodb.com
Issue Tracking Patch Vendor Advisory
https://jira.mongodb.org/browse/SWIFT-1229
Source: cna@mongodb.com
Issue Tracking
https://jira.mongodb.org/browse/CDRIVER-3797
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Vendor Advisory
https://jira.mongodb.org/browse/CXX-2028
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Vendor Advisory
https://jira.mongodb.org/browse/NODE-3356
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Vendor Advisory
https://jira.mongodb.org/browse/PHPC-1869
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Vendor Advisory
https://jira.mongodb.org/browse/SWIFT-1229
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://security.netapp.com/advisory/ntap-20231006-0001/
Source: af854a3a-2127-422b-91ae-364da2661108

13 reference(s) from NVD

Quick Stats

CVSS v3 Score
4.2 / 10.0
EPSS (Exploit Probability)
0.0%
12th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mongodb