A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.
{
"cpes": [
"cpe:2.3:a:mongodb:mongodb:*:*:*:*:-:*:*:*"
],
"severity": "High"
}