Vulnerabilities/

ejson shell parser in MongoDB Compass maybe bypassed

Severity:
High

Description

MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass’ connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2.

Recommendation

Update the @mongodb-js/connection-form package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
@mongodb-js/connection-form
Anything's wrong? Let us know Last updated on February 27, 2025

This issue is available in SmartScanner Professional

See Pricing