This issue impacts MongoDB Server v7.0 versions prior to 7.0.34, v8.0 versions prior to 8.0.23, v8.2 versions prior to 8.2.9 and v8.3 versions prior to 8.3.2.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://jira.mongodb.org/browse/SERVER-120668 |
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mongodb
Mongodb mongodb Mongodb mongodb Server |
|
| Vendors & Products |
Mongodb
Mongodb mongodb Mongodb mongodb Server |
Wed, 13 May 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Using a densely populated chars mask and a large input string in the MongoDB aggregation operators $trim, $ltrim, and $rtrim, an authenticated user with aggregation permissions can pin CPU utilization at 100% for an extended period of time. This issue impacts MongoDB Server v7.0 versions prior to 7.0.34, v8.0 versions prior to 8.0.23, v8.2 versions prior to 8.2.9 and v8.3 versions prior to 8.3.2. | |
| Title | Post-authentication CPU utilization DoS via $trim/$ltrim/$rtrim operators | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mongodb
Published:
Updated: 2026-05-13T01:38:09.751Z
Reserved: 2026-05-08T23:43:11.551Z
Link: CVE-2026-8202
Updated: 2026-05-13T01:38:05.952Z
No data.
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:35:04Z