{"id":"CVE-2022-48282","details":"Under very specific circumstances (see Required configuration section below), a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0\n\nFollowing configuration must be true for the vulnerability to be applicable:  *  Application must written in C# taking arbitrary data from users and serializing data using _t without any validation AND\n  *  Application must be running on a Windows host using the full .NET Framework, not .NET Core AND\n  *  Application must have domain model class with a property/field explicitly of type System.Object or a collection of type System.Object (against MongoDB best practice) AND\n  *  Malicious attacker must have unrestricted insert access to target database to add a _t discriminator.\"Following configuration must be true for the vulnerability to be applicable\n\n\n\n","aliases":["GHSA-7j9m-j397-g4wx"],"modified":"2026-03-20T12:21:43.257774Z","published":"2023-02-21T19:15:10.827Z","references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230324-0003/"},{"type":"ADVISORY","url":"https://github.com/mongodb/mongo-csharp-driver/releases/tag/v2.19.0"},{"type":"FIX","url":"https://jira.mongodb.org/browse/CSHARP-4475"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mongodb/mongo-csharp-driver","events":[{"introduced":"0"},{"fixed":"3db6a367ebbbabb164e24c0e74eb061b49c9e855"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.19.0"}]}}],"versions":["v0.11.0.4042","v0.5.0.3940","v0.7.0.3959","v0.9.0.3992","v1.0.0.4098","v1.1.0.4184","v1.2.0.4274","v1.3.0.4309","v1.4.0.4468","v1.4.1.4490","v1.4.2.4500","v1.5.0.4566","v1.6.0.4624","v1.6.0rc0","v1.6.1.4678","v1.7.0.4714","v1.8.0.124","v1.8.1.20","v1.8.2.34","v1.9.0","v1.9.0-rc0","v1.9.0-rc1","v2.0.0","v2.0.0-beta1","v2.0.0-beta2","v2.0.0-beta3","v2.0.0-beta4","v2.0.0-rc0","v2.1.0-rc0","v2.1.0-rc1","v2.10.0","v2.10.0-beta1","v2.11.0","v2.11.0-beta1","v2.11.0-beta2","v2.12.0","v2.12.0-beta1","v2.13.0","v2.13.0-beta1","v2.14.0","v2.14.0-beta1","v2.15.0","v2.16.0","v2.17.0","v2.18.0","v2.2.0","v2.2.0-rc0","v2.2.1","v2.3.0","v2.3.0-beta1","v2.3.0-rc1","v2.4.0","v2.4.0-beta1","v2.4.1","v2.4.2","v2.4.3","v2.4.4","v2.5.0","v2.7.0","v2.7.0-beta1","v2.9.0","v2.9.0-beta1","v2.9.0-beta2","v2.9.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48282.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}