CVE-2026-42334 PUBLISHED

Mongoose: Improper Sanitization of $nor in sanitizeFilter May Allow NoSQL Injection

Assigner: GitHub_M
Reserved: 26.04.2026 Published: 14.05.2026 Updated: 14.05.2026

Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Prior to 6.13.9, 7.8.9, 8.22.1, and 9.1.6, a vulnerability allows bypassing Mongoose’s sanitizeFilter query sanitization mechanism via the $nor operator. When sanitizeFilter is enabled, Mongoose wraps query operators in $eq to neutralize them. However, prior to the fix, $nor was not included in the set of logical operators that are recursively sanitized. Because $nor accepts an array (like $and and $or), and arrays do not trigger hasDollarKeys(), malicious operators such as $ne, $gt, or $regex could be injected inside a $nor clause without being sanitized. This vulnerability is fixed in 6.13.9, 7.8.9, 8.22.1, and 9.1.6.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 7.5

Product Status

Vendor Automattic
Product mongoose
Versions
  • Version < 6.13.9 is affected
  • Version >= 7.0.0, <= 7.8.8 is affected
  • Version >= 8.0.0, <= 8.22.0 is affected
  • Version >= 9.0.0, <= 9.1.5 is affected

References

Problem Types

  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE