<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mongoose — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/mongoose/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 21:49:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/mongoose/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mongoose NoSQL Injection Vulnerability via $nor Operator</title><link>https://feed.craftedsignal.io/briefs/2026-05-mongoose-nosql-injection/</link><pubDate>Tue, 05 May 2026 21:49:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mongoose-nosql-injection/</guid><description>Mongoose versions before 6.13.9, versions 7.0.0 through 7.8.8, versions 8.0.0 through 8.22.0, and versions 9.0.0 through 9.1.5 are vulnerable to NoSQL injection due to improper sanitization of the $nor operator, potentially allowing attackers to bypass query sanitization and exfiltrate data.</description><content:encoded><![CDATA[<p>Mongoose, a MongoDB object modeling tool designed to work in an asynchronous environment, is susceptible to a NoSQL injection vulnerability. Specifically, the <code>sanitizeFilter</code> function fails to properly sanitize the <code>$nor</code> operator, leading to potential bypass of query sanitization mechanisms. This issue affects Mongoose versions prior to 6.13.9, versions between 7.0.0 and 7.8.8, versions between 8.0.0 and 8.22.0, and versions between 9.0.0 and 9.1.5. Successful exploitation could lead to unauthorized data access, authentication bypass, and data exfiltration. Defenders should prioritize patching or implementing workarounds to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application using a vulnerable version of Mongoose with <code>sanitizeFilter</code> enabled.</li>
<li>The attacker crafts a malicious payload containing a <code>$nor</code> operator with an embedded, unsanitized operator (e.g., <code>$ne</code>, <code>$gt</code>, or <code>$regex</code>).</li>
<li>The attacker injects the malicious payload into a user-controlled input field, such as a search parameter or login field.</li>
<li>The application passes the unsanitized input directly to a Mongoose query method (e.g., <code>Model.findOne(req.body)</code>).</li>
<li>Mongoose&rsquo;s <code>sanitizeFilter</code> function fails to properly sanitize the <code>$nor</code> operator, allowing the malicious operator to bypass sanitization.</li>
<li>The malicious operator is executed against the MongoDB database.</li>
<li>The attacker bypasses authentication, gains unauthorized data access, or exfiltrates sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to significant impact, including authentication bypass, where attackers can gain access to user accounts without proper credentials. Unauthorized data access allows attackers to view and modify sensitive data that they should not have access to. Data exfiltration enables attackers to steal confidential information from the database. Organizations using vulnerable versions of Mongoose are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Mongoose version 6.13.9 or later, 7.8.9 or later, 8.22.1 or later, or 9.1.6 or later to patch the vulnerability as described in <a href="https://github.com/advisories/GHSA-wpg9-53fq-2r8h">GHSA-wpg9-53fq-2r8h</a>.</li>
<li>Deploy the following Sigma rule to detect the use of <code>$nor</code> in query parameters to <code>webserver</code> logs and tune for your environment.</li>
<li>Implement a workaround by deleting <code>$nor</code> keys or using an additional schema validation library as recommended in <a href="https://github.com/advisories/GHSA-wpg9-53fq-2r8h">GHSA-wpg9-53fq-2r8h</a>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>nosql-injection</category><category>mongoose</category><category>sanitizeFilter</category></item></channel></rss>