Home

Description

A use-after-free vulnerability exists in MongoDB's Field-Level Encryption (FLE) query analysis component, affecting client-side uses of mongocryptd and crypt_shared. Triggering this vulnerability requires control over the structure of a client's FLE-related query. This issue impacts MongoDB Server’s mongocryptd component v7.0 versions prior to 7.0.34, v8.0 versions prior to 8.0.23, v8.2 versions prior to 8.2.9 and v8.3 versions prior to 8.3.2.

PUBLISHED Reserved 2026-05-08 | Published 2026-05-13 | Updated 2026-05-13 | Assigner mongodb




MEDIUM: 6.1CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:N/SA:N

MEDIUM: 6.4CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H

Problem types

CWE-416: Use After Free

Product status

Default status
unaffected

7.0 (custom) before 7.0.34
affected

8.0 (custom) before 8.0.23
affected

8.2 (custom) before 8.2.9
affected

8.3 (custom) before 8.3.2
affected

References

jira.mongodb.org/browse/SERVER-122032 issue-tracking

cve.org (CVE-2026-8201)

nvd.nist.gov (CVE-2026-8201)

Download JSON