Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, Socket.IO clients can send arbitrary JavaScript objects as the id argument to any service method (get, patch, update, remove). The transport layer performs no type checking on this argument. When the service uses the MongoDB adapter, these objects pass through getObjectId() and land directly in the MongoDB query as operators. Sending {$ne: null} as the id matches every document in the collection. This vulnerability is fixed in 5.0.42.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p9xr-7p9p-gpqx | Feathers has a NoSQL Injection via WebSocket id Parameter in MongoDB Adapter |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 11 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Feathersjs
Feathersjs mongodb |
|
| Vendors & Products |
Feathersjs
Feathersjs mongodb |
Tue, 10 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, Socket.IO clients can send arbitrary JavaScript objects as the id argument to any service method (get, patch, update, remove). The transport layer performs no type checking on this argument. When the service uses the MongoDB adapter, these objects pass through getObjectId() and land directly in the MongoDB query as operators. Sending {$ne: null} as the id matches every document in the collection. This vulnerability is fixed in 5.0.42. | |
| Title | NoSQL Injection via WebSocket id Parameter in MongoDB Adapter | |
| Weaknesses | CWE-943 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-10T20:08:52.109Z
Reserved: 2026-03-04T16:26:02.900Z
Link: CVE-2026-29793
No data.
Status : Received
Published: 2026-03-10T20:16:39.437
Modified: 2026-03-10T20:16:39.437
Link: CVE-2026-29793
No data.
OpenCVE Enrichment
Updated: 2026-03-11T11:43:01Z
Weaknesses
Github GHSA