AppSec Weekly Content Briefing
December 31, 2025

MongoBleed Exploited Christmas Morning, 87K Servers at Risk | Dec 25-31

Big Picture

Christmas Day brought MongoBleed exploitation across 87,000 exposed servers.

Happy New Years. 2025. What an AI-fueled ride.

We published a top 10 stories from the 10 weeks we've been running this AppSec Weekly.

If you scan the list, there's a lot. From China using Claude to automate attacks, MCPs and dev tools becoming a new attack vector, to massive vulnerabilities like React2Shell.

This Christmas to New Years week continued the torrid pace with MongoBleed coming to light Christmas Day across 87,000 exposed MongoDB servers.

In other news OWASP published its first Agentic AI Top 10 framework, formally acknowledging AI systems operating inside infrastructure break traditional perimeter assumptions. And multiple surveys and new data showed what we probably already all know: AI coding tools still struggle with production engineering, especially as it relates to generating secure code.

TL;DR

MongoBleed (CVE-2025-14847) exploited within hours of disclosure, with 87,000+ MongoDB servers exposed and CISA mandating federal agencies patch by January 19, 2026.
OWASP released its first Agentic AI Top 10 framework, acknowledging that traditional perimeter security breaks when AI agents operate autonomously inside infrastructure.
Survey data confirms AI coding tools increasing bad code volumes, while OpenAI's own research shows even frontier models struggle with real-world engineering tasks.
This week: 79 vulnerabilities disclosed | 2 actively exploited | 1 zero-day

MongoBleed Exploited Before the Holiday Leftovers Were Cold

MongoBleed (CVE-2025-14847) hit Christmas Day, and attackers started exploiting it within hours. The memory leak in MongoDB's zlib compression lets unauthenticated attackers exfiltrate credentials, session tokens, and API keys from uninitialized memory.

Security researcher Kevin Beaumont confirmed the severity: "You can just supply an IP address of a MongoDB instance and it'll start ferreting out in memory things such as database passwords."

The scale: 87,000+ internet-exposed MongoDB instances vulnerable, with a public proof-of-concept making exploitation accessible to anyone paying attention. CISA added it to the KEV catalog and mandated federal agencies remediate by January 19, 2026.

Takeaways

The pattern is familiar now. React2Shell exploited within hours. IngressNightmare hitting Kubernetes at scale. MongoBleed on Christmas morning. The disclosure-to-exploitation window has compressed beyond what traditional patching workflows can handle.

Edge Security Is Not Enough for Agentic AI

OWASP released its first Agentic AI Top 10 framework this week. The core message: AI agents operating autonomously inside your infrastructure break perimeter security assumptions.

The architectural analysis is clear: "AI systems don't just generate responses, they take action. Agents trigger workflows, call APIs, update records, fan out across services." Traditional edge security was designed for threats from outside. Agentic AI operates inside the mesh where those controls have limited visibility.

This isn't theoretical. The 39C3 presentation on exploiting AI coding agents showed practical exploits against AI systems that execute code and interact with infrastructure autonomously.

Takeaways

When AI agents trigger internal API calls and execute code without human approval, the attack surface moves to wherever those agents have access. Juxtaposed to our previous coverage of how orgs dont have AI policies in place we continue to grapple with new security surfaces.

AI Coding Tools Face a Reality Check

Three reports this week highlighted that (for now) AI coding tools may be creating more work than they eliminate, even if the nature of that works shifts.

Survey findings show AI tools are "increasing the blast radius of bad code that needs to be debugged." Multiple sources validated the pattern: AI accelerates code output while quality and security remain questionable.

OpenAI's own SWE-Lancer benchmark demonstrated that even frontier models struggle with real-world engineering tasks. The benchmark tested practical work rather than isolated coding exercises. The gap between "can generate code" and "can ship production software" remains significant.

Analysis of 153 million lines of code reinforced the pattern: AI tools may accelerate development "at the expense of maintainable, quality code."

Takeaways

The tools generating code faster aren't generating code that's easier to maintain, secure, or debug.

$84 Billion in Security M&A Signals Consolidation

Eight cybersecurity acquisitions exceeded $1 billion in 2025, totaling over $84 billion. The headline deals: Google's $32B Wiz purchase and Palo Alto Networks' $25B CyberArk acquisition. The Palo Alto-Google Cloud strategic alliance signals how platform vendors are positioning around AI security.

Takeaways

When $84B changes hands in a year and the largest deals involve platform plays, expect the vendors you evaluate to look different in 12 months.

Vulnerabilities in the Wild

Actively Exploited

CVE Name Product Status
CVE-2025-14847 MongoBleed MongoDB zlib compression CISA KEV - 87K+ servers exposed. Federal deadline Jan 19, 2026

High Severity

CVE(s) Name Product Status
CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514 IngressNightmare Kubernetes Ingress NGINX CVSS 9.8 RCE - Patched, ongoing exploitation
CVE-2024-49112 LDAPNightmare Windows LDAP PoC published
LangChain Core LangChain Core Critical serialization injection

Supply Chain

Name Ecosystem Details
Maven Central Jackson Typosquatting Maven Central First sophisticated malware with multi-stage payloads and Cobalt Strike beacons
Shai-Hulud 3.0 npm Holiday season variant with improved evasion techniques
EmEditor Supply Chain Attack Developer tools Infostealer via compromised installer

Your Curated Weekly Reading List

Links that add depth beyond what we covered above:

CISOs are managing risk in survival mode - Strategic context on CISO budget/risk dynamics: "spending big and still losing ground."

First Sophisticated Malware Discovered on Maven Central - Technical deep-dive on Java supply chain escalation with Cobalt Strike beacons.

The Holiday Whisper: Shai-Hulud 3.0 - Technical analysis of evolving npm malware tactics during holiday season.

LLMs can assist with vulnerability scoring, but context still matters - Nuanced take on AI/security intersection beyond the "AI code is bad" framing.

Security teams debate how much to trust AI - Practitioner perspectives on AI trust in security workflows.

Looking to Stay Up to Date with All Things AppSec?

Subscribe to the Weekly AppSec Briefing and never miss a thing.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.