Skip to content

NoSQL Injection via WebSocket id Parameter in MongoDB Adapter

High
daffl published GHSA-p9xr-7p9p-gpqx Mar 10, 2026

Package

npm @feathersjs/mongodb (npm)

Affected versions

>= 5.0.0, <= 5.0.41

Patched versions

>= 5.0.42

Description

Socket.IO clients can send arbitrary JavaScript objects as the id argument to any service method (get, patch, update, remove). The transport layer performs no type checking on this argument. When the service uses the MongoDB adapter, these objects pass through getObjectId() and land directly in the MongoDB query as operators. Sending {$ne: null} as the id matches every document in the collection.

Severity

High

CVE ID

CVE-2026-29793

Weaknesses

Improper Neutralization of Special Elements in Data Query Logic

The product generates a query intended to access or manipulate data in a data store such as a database, but it does not neutralize or incorrectly neutralizes special elements that can modify the intended logic of the query. Learn more on MITRE.

Credits