Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://jira.mongodb.org/browse/CDRIVER-6134 |
|
Thu, 07 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mongodb
Mongodb c Driver |
|
| Vendors & Products |
Mongodb
Mongodb c Driver |
Wed, 06 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The MongoDB C Driver's Cyrus SASL integration performs unsafe string copying during username canonicalization, enabling a heap buffer overflow before any authentication or network traffic. This may be triggered by passing untrusted input in the username of a MongoDB URI with authMechanism=GSSAPI. | |
| Title | MongoDB C Driver Cyrus SASL Canonicalization Buffer Overflow | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mongodb
Published:
Updated: 2026-05-07T03:55:47.410Z
Reserved: 2026-04-20T16:17:41.724Z
Link: CVE-2026-6691
Updated: 2026-05-06T15:24:26.254Z
Status : Awaiting Analysis
Published: 2026-05-06T16:16:11.483
Modified: 2026-05-07T15:11:09.037
Link: CVE-2026-6691
No data.
OpenCVE Enrichment
Updated: 2026-05-07T21:25:38Z