Vulnerabilities/

Feathers has a NoSQL Injection via WebSocket id Parameter in MongoDB Adapter

Severity:
High

Description

Socket.IO clients can send arbitrary JavaScript objects as the id argument to any service method (get, patch, update, remove). The transport layer performs no type checking on this argument. When the service uses the MongoDB adapter, these objects pass through getObjectId() and land directly in the MongoDB query as operators.

Recommendation

Update the @feathersjs/mongodb package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
@feathersjs/mongodb
Anything's wrong? Let us know Last updated on March 10, 2026