Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| mongoosejs | Mongoose | 6.0.0 ~ 6.13.6 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | NoSQL injection vulnerability in Mongoose < 8.9.5 affecting the populate() function's match option. This vulnerability exists due to an incomplete fix for CVE-2024-53900. While direct $where injection is blocked, attackers can bypass this protection by nesting $where operators within logical operators like $and, allowing execution of arbitrary JavaScript code on MongoDB server, bypassing authentication, and accessing sensitive administrative data. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-23061.yaml | POC Details |
| 2 | CVE-2025-23061 - Mongoose Command Injection | https://github.com/dajneem23/CVE-2025-23061 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet