CVE-2026-8053 in MongoDB time-series — affects you even if your app doesn't use time-series collections
Disclosure up front: I work at Percona. Posting this because the framing in some of the chatter I'm seeing about CVE-2026-8053 is going to leave many teams exposed.
The bug in one line: out-of-bounds memory write in MongoDB's time-series bucket catalog. An authenticated user with the readWrite role on any database can trigger it via a crafted sequence of operations against a time-series collection. CVSS v3.1 8.8, v4.0 8.7. Upstream tracking: SERVER-126021.
Why is the prerequisite weaker than it looks?
The advisory says the attacker needs database write privileges. That's accurate, but in practice, it means the built-in readWrite role, which is what most application accounts already hold.
So an attacker who lifts an application credential — from a CI log, a .env file, a compromised pod, an ex-employee's laptop — does not need your deployment to already host a time-series collection. They can create one on the spot and reach the vulnerable code path.
If your team is currently in the "we don't use time-series, we're fine" conversation, that's not the mitigation it sounds like. The only meaningful options are patching or restricting readWrite role to your application accounts (which most apps will break if you do it at runtime).
Fixed versions
- MongoDB Server (upstream): see SERVER-126021 for the fixed versions for each major release; fixes are available from 5.0 to 8.3.
- Percona Server for MongoDB:
- 7.0.34-19 — May 20, 2026
- 8.0.23-10 — May 21, 2026
- 6.0.x patch — targeted for May 25, 2026
- 5.x: no binary packages, but the fix is on the public release branch release-5.0.33-26 if you need to build it.
If you're running PSMDB on Kubernetes via the Percona Operator, you don't need to wait for an operator release — trigger the upgrade in the nearest possible maintenance window.
What I'd actually do today
- Patch on whichever schedule matches your major version.
- Audit custom roles. Anything granting
readWriteto application accounts is, until you patch, an RCE primitive in waiting. Decide whether those accounts really need to write at runtime or whether they can be scoped to a known set. - If you haven't already, enable MongoDB auditing for createCollection events. Useful for spotting unexpected time-series collection creation in the window before everyone is patched.
I am happy to answer any questions in the thread.
If you want the longer write-up — including the operational case that "authenticated RCE" deserves more urgency than it usually gets — I wrote it up on the Percona blog: https://www.percona.com/blog/cve-2026-8053-we-dont-use-time-series-is-not-a-mitigation/