{"uuid": "fd210719-bd8e-408d-943d-ee89bcc71d4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1692", "type": "seen", "source": "https://t.me/cvedetector/19042", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1692 - MongoDB Shell Control Character Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1692 \nPublished : Feb. 27, 2025, 1:15 p.m. | 2\u00a0hours, 14\u00a0minutes ago \nDescription : The MongoDB Shell may be susceptible to control character injection where an attacker with control of the user\u2019s clipboard could manipulate them to paste text into mongosh that evaluates arbitrary code. Control characters in the pasted text can be used to obfuscate malicious code. This issue affects mongosh versions prior to 2.3.9 \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T16:45:07.000000Z"}