| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wpg9-53fq-2r8h | Mongoose's Improper Sanitization of $nor in sanitizeFilter May Allow NoSQL Injection |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 14 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Automattic
Automattic mongoose |
|
| Vendors & Products |
Automattic
Automattic mongoose |
Thu, 14 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Prior to 6.13.9, 7.8.9, 8.22.1, and 9.1.6, a vulnerability allows bypassing Mongoose’s sanitizeFilter query sanitization mechanism via the $nor operator. When sanitizeFilter is enabled, Mongoose wraps query operators in $eq to neutralize them. However, prior to the fix, $nor was not included in the set of logical operators that are recursively sanitized. Because $nor accepts an array (like $and and $or), and arrays do not trigger hasDollarKeys(), malicious operators such as $ne, $gt, or $regex could be injected inside a $nor clause without being sanitized. This vulnerability is fixed in 6.13.9, 7.8.9, 8.22.1, and 9.1.6. | |
| Title | Mongoose: Improper Sanitization of $nor in sanitizeFilter May Allow NoSQL Injection | |
| Weaknesses | CWE-74 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T18:18:06.935Z
Reserved: 2026-04-26T13:26:14.514Z
Link: CVE-2026-42334
Updated: 2026-05-14T18:18:02.203Z
Status : Awaiting Analysis
Published: 2026-05-14T18:16:47.747
Modified: 2026-05-14T18:26:39.827
Link: CVE-2026-42334
No data.
OpenCVE Enrichment
Updated: 2026-05-14T19:30:26Z
Github GHSA