CVE-2026-4358 Overview
A memory corruption vulnerability has been identified in MongoDB's slot-based execution (SBE) engine. The flaw occurs when a specially crafted aggregation query using the $lookup operator is executed by an authenticated user with write privileges. When an in-memory hash table is spilled to disk during query processing, the vulnerability can trigger a double-free or use-after-free memory condition, potentially leading to application crashes or memory corruption.
Critical Impact
Authenticated users with write privileges can exploit this memory corruption vulnerability to cause denial of service or potentially corrupt memory state in the MongoDB database server.
Affected Products
- MongoDB Server (versions affected per SERVER-118849)
- MongoDB deployments using the slot-based execution (SBE) engine
- Environments where aggregation queries with $lookup are permitted
Discovery Timeline
- 2026-03-17 - CVE CVE-2026-4358 published to NVD
- 2026-03-18 - Last updated in NVD database
Technical Details for CVE-2026-4358
Vulnerability Analysis
This vulnerability falls into the Double Free (CWE-415) category of memory corruption vulnerabilities. The issue resides in MongoDB's slot-based execution (SBE) engine, which is designed to optimize query performance. When processing aggregation pipelines that include the $lookup stage, the engine maintains in-memory hash tables to facilitate join operations.
Under memory pressure conditions, these hash tables may be spilled to disk to manage resource consumption. During this spill operation, improper memory management leads to either a double-free condition (where memory is freed twice) or a use-after-free condition (where memory is accessed after being freed). Both scenarios can result in heap corruption, application instability, or crashes.
The attack requires an authenticated user with write privileges to craft and execute a malicious aggregation query. While the network attack vector makes this remotely exploitable, the requirement for authentication and specific privileges reduces the immediate exposure surface.
Root Cause
The root cause is improper memory lifecycle management within the SBE engine's hash table spill-to-disk functionality. When the engine transitions hash table data from memory to disk storage, the code path fails to correctly track memory ownership, resulting in either duplicate deallocation calls or continued access to freed memory regions. This represents a classic memory safety issue in the C++ codebase where pointer invalidation is not properly synchronized with memory operations.
Attack Vector
The attack vector is network-based and requires the following conditions:
- Authentication: The attacker must possess valid credentials to the MongoDB instance
- Write Privileges: The authenticated user must have write access permissions
- Query Construction: A specially crafted aggregation query using $lookup must be constructed to trigger the hash table spill condition
- Memory Pressure: The query must cause sufficient memory usage to trigger the spill-to-disk mechanism
The vulnerability is exploitable by submitting a malicious aggregation pipeline through MongoDB's query interface. The complexity involved in triggering the specific memory conditions means exploitation may require multiple attempts or specific environmental conditions.
Detection Methods for CVE-2026-4358
Indicators of Compromise
- Unexpected MongoDB server crashes or restarts, particularly during aggregation query execution
- Core dumps or crash logs indicating memory corruption in the SBE engine components
- Abnormal aggregation queries with complex $lookup stages from unusual user accounts
- Memory corruption error messages in MongoDB server logs
Detection Strategies
- Monitor MongoDB server logs for crash events related to aggregation pipeline execution
- Implement query auditing to track $lookup aggregation operations, especially those with unusual complexity
- Deploy memory debugging tools (such as AddressSanitizer) in non-production environments to detect memory issues
- Review authentication logs for accounts executing high volumes of complex aggregation queries
Monitoring Recommendations
- Enable MongoDB profiling to capture slow or resource-intensive aggregation queries
- Configure alerts for MongoDB process crashes or unexpected restarts
- Monitor system memory usage patterns during aggregation operations
- Implement log aggregation to correlate crash events with query execution patterns
How to Mitigate CVE-2026-4358
Immediate Actions Required
- Review and restrict write privileges to only necessary users and applications
- Audit existing aggregation queries for suspicious $lookup patterns
- Consider temporarily disabling or limiting access to aggregation pipelines in high-risk environments
- Monitor for any unusual query activity from authenticated users
Patch Information
MongoDB has tracked this issue in JIRA Issue SERVER-118849. Administrators should monitor this issue and MongoDB security advisories for official patch releases. Apply vendor patches as soon as they become available to remediate this vulnerability.
Workarounds
- Implement strict role-based access control to limit write privileges to essential users only
- Use MongoDB's query validation features to restrict complex aggregation patterns if supported
- Consider deploying additional query filtering at the application layer to block suspicious $lookup operations
- Enable authentication auditing to track and investigate unusual query patterns
- Deploy network segmentation to limit exposure of MongoDB instances to untrusted networks
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


