{"uuid": "c4f04326-3670-42f8-becf-c88df3f297d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1692", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5675", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1692\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The MongoDB Shell may be susceptible to control character injection where an attacker with control of the user\u2019s clipboard could manipulate them to paste text into mongosh that evaluates arbitrary code. Control characters in the pasted text can be used to obfuscate malicious code. This issue affects mongosh versions prior to 2.3.9\n\ud83d\udccf Published: 2025-02-27T12:37:00.376Z\n\ud83d\udccf Modified: 2025-02-27T12:37:00.376Z\n\ud83d\udd17 References:\n1. https://jira.mongodb.org/browse/MONGOSH-2025", "creation_timestamp": "2025-02-27T13:27:45.000000Z"}