NIST Advisory CVE-2025-14847 - MongoBleed Vulnerability
A vulnerability found in MongoDB may affect your OPC Router installations if remote access is exposed. Please read the following articles to take action on mitigating your risks. This has been fixed in the latest release of OPC Router 5.5.5008.203.
A security vulnerability known as MongoBleed (CVE-2025-14847) has been disclosed for MongoDB. Full technical details are available via the NIST National Vulnerability Database.
MongoBleed applies only when a MongoDB instance is reachable over the network. It does not affect all MongoDB installations and is not exploitable in default, local-only configurations.
OPC Router uses MongoDB internally for configuration and runtime data. The OPC Router development team has completed its assessment of the impact on OPC Router 4.x and 5.x and has released corrective updates.
This article summarizes the current risk assessment, confirmed fixes, and recommended actions.
Impact on OPC Router 5.x
For standard OPC Router 5.x installations, the risk from MongoBleed has been determined to be minimal to none.
Why OPC Router 5.x is not affected by default
-
OPC Router 5.x does not use a network-accessible MongoDB instance by default
-
MongoBleed requires network-level access to MongoDB to be exploitable
-
Default configurations significantly limit exposure in typical deployments
Confirmed fix
As of OPC Router version 5.5.5008.203, MongoDB has been updated to version 8.0.17, which includes the official fix for CVE-2025-14847.
➡️ OPC Router 5.5.5008.203 and newer are fully patched.
OPC Router 5.x on Docker
For Docker-based OPC Router 5.x deployments:
-
Do not expose the MongoDB port (27017) externally
-
MongoDB should only be accessible inside the container or internal Docker network
-
Exposing
-p 27017:27017is not recommended
If your Docker configuration currently publishes the MongoDB port, it should be reviewed and hardened.
With 5.5.5008.203 or later, MongoDB is patched even if misconfigured — but limiting network exposure remains a best practice.
OPC Router 5.x on Windows
For standard Windows installations:
-
MongoDB runs on localhost only by default
-
The database is not reachable from other systems
-
This default behavior prevents MongoBleed exploitation
With the MongoDB upgrade included in 5.5.5008.203, Windows installations now benefit from both:
-
Secure default configuration
-
Updated MongoDB binaries with the official fix
Impact on OPC Router 4.x
OPC Router 4.x uses a legacy remote management architecture that can increase exposure in certain scenarios.
Higher-risk scenarios
-
When Remote Management is enabled
-
When MongoDB is reachable over the network
Because of this:
-
OPC Router 4.x installations with Remote Management enabled should be reviewed carefully
-
These deployments have a larger attack surface than OPC Router 5.x
Recommendations for OPC Router 4.x Users
Immediate actions
-
Review whether MongoDB is reachable over the network
-
Restrict access where possible
-
Upgrade OPC Router if exposure cannot be eliminated
High-Security / Regulated Environments
For environments with elevated security requirements (regulated industries, critical infrastructure, segmented networks):
-
Ensure MongoDB is not exposed to untrusted networks
-
Prefer OPC Router 5.5.5008.203 or later
-
For Docker deployments, never publish the MongoDB port
These steps align with industry best practices for mitigating MongoBleed-related risks.
Getting Support
If you have questions about how MongoBleed affects your OPC Router deployment, or if you need assistance evaluating or hardening your environment, please contact Software Toolbox Technical Support with the following details where possible:
- OPC Router version (4.x or 5.x, and specific build)
- Operating system and deployment model (Windows, Docker, etc.)
- Whether Remote Management is enabled (for OPC Router 4.x)
- Any known network exposure of the MongoDB instance