MongoDB is committed to the security of its products and the protection of customer data. Security researchers, customers, and partners are encouraged to report potential vulnerabilities or incidents related to MongoDB products to help ensure timely resolution.
MongoDB operates a bug bounty program through HackerOne, where eligible security researchers may receive monetary rewards for valid vulnerability reports. MongoDB’s security team reviews and validates all submissions in accordance with the company’s Vulnerability Disclosure Policy.
Further details on submitting a vulnerability report, including the current scope and rewards, can be found on the HackerOne program page.
For those who prefer not to participate in the bug bounty program, security vulnerabilities can also be submitted directly via the security bug form.
Security bugs or vulnerabilities found on any MongoDB products or tools may be reported via the security bug form. Please refer to the security-related information and configuration guidance below before submitting a new vulnerability.
The scope of MongoDB’s bug bounty program is MongoDB Owned Domains, MongoDB Free Tier Atlas, and a few MongoDB Shipped Products with exceptions (please refer to the Out of Scope section). For a detailed list of our scopes, please refer to the HackerOne program page. When submitting a report, if the asset involved is not explicitly called out in scope, it will not be eligible for bounty.
If the vulnerability falls outside of this immediate scope, you are encouraged to submit the vulnerability via MongoDB’s security bug form.
Please note that all evergreen endpoints (including staging) are out of scope of this program and not eligible for bounty.
See MongoDB’s Legal Hub for our Privacy Policy and more information on our privacy program.
MongoDB, Inc. requests that security researchers do not publicly disclose any information regarding the vulnerabilities they discover or exploit the issue until the company has had the opportunity to analyze the vulnerability, to respond to the notification, and to notify key users, customers, and partners.
The amount of time required to validate a reported vulnerability depends on the complexity and severity of the issue. MongoDB, Inc. takes all required security vulnerabilities very seriously and will always ensure that there is a clear and open channel of communication with the reporter. After validating an issue, MongoDB, Inc. coordinates public disclosure of the issue with the reporter in a mutually agreed timeframe and format.
For support, please use the MongoDB Support Hub.