{"id":"CVE-2021-21422","details":"mongo-express is a web-based MongoDB admin interface, written with Node.js and express. 1: As mentioned in this issue: https://github.com/mongo-express/mongo-express/issues/577, when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell. 2: Data cells identified as media will be rendered as media, without being sanitized. Example of different renders: image, audio, video, etc. As an example of type 1 attack, an unauthorized user who only can send a large amount of data in a field of a document may use a payload with embedded javascript. This could send an export of a collection to the attacker without even an admin knowing. Other types of attacks such as dropping a database\\collection are possible.","aliases":["GHSA-7p8h-86p5-wv3p"],"modified":"2026-03-14T14:50:19.065672Z","published":"2021-06-21T19:15:07.947Z","related":["GHSA-7p8h-86p5-wv3p"],"references":[{"type":"FIX","url":"https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b"},{"type":"EVIDENCE","url":"https://github.com/mongo-express/mongo-express/issues/577"},{"type":"EVIDENCE","url":"https://github.com/mongo-express/mongo-express/security/advisories/GHSA-7p8h-86p5-wv3p"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mongo-express/mongo-express","events":[{"introduced":"0"},{"last_affected":"7d365141deadbd38fa961cd835ce68eab5731494"},{"fixed":"f5e0d4931f856f032f22664b5e5901d5950cfd4b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.54.0"}]}}],"versions":["0.29.10","v0.10.0","v0.11.0","v0.11.1","v0.11.2","v0.11.3","v0.12.0","v0.13.0","v0.14.0","v0.14.1","v0.15.0","v0.16.0","v0.16.1","v0.17.0","v0.17.1","v0.17.2","v0.17.3","v0.17.4","v0.17.5","v0.2.1","v0.2.2","v0.2.3","v0.27.4","v0.3.0","v0.3.1","v0.3.2","v0.3.3","v0.3.4","v0.32.0","v0.33.0","v0.34.0","v0.35.0","v0.37.0","v0.37.1","v0.37.2","v0.38.0","v0.39.0","v0.39.1","v0.39.2","v0.4.0","v0.40.0","v0.41.0","v0.42.0","v0.42.1","v0.42.2","v0.42.3","v0.43.0","v0.43.1","v0.44.0","v0.45.0","v0.46.0","v0.46.1","v0.47.0","v0.48.0","v0.48.1","v0.49.0","v0.5.0","v0.50.0","v0.51.0","v0.51.1","v0.51.2","v0.52.0","v0.52.1","v0.52.2","v0.53.0","v0.54.0","v0.6.0","v0.7.0","v0.7.1","v0.8.0","v0.8.1","v0.9.0","v1.0.0-alpha.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-21422.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.0.0-alpha1"}]},{"events":[{"introduced":"0"},{"last_affected":"1.0.0-alpha3"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}