Hi @bbattey, thanks for posting.
We are expecting to upgrade MongoDB to more recent versions in upcoming CryoSPARC versions.
As you mentioned, and as a reminder for other readers, CryoSPARC is only designed to be deployed within a trusted internal network, and no part of CryoSPARC (including the MongoDB database) should ever be exposed to any untrusted network or the public internet. See: CryoSPARC Architecture and System Requirements | CryoSPARC Guide
Regarding the âMongoBleedâ vulnerability (CVE-2025-14847) specifically: the official MongoDB ticket indicates that vulnerable databases are those that use zlib network compression and that disabling zlib compression is a workaround that avoids the vulnerability. Furthermore, the official MongoDB documentation for MongoDB v3.6 (used in CryoSPARC v4.7) confirms that zlib compression is not enabled by default in MongoDB v3.6; only snappy compression is enabled by default. CryoSPARC uses default MongoDB compression configuration and therefore the database does not have zlib compression enabled.
It is possible to query the database to confirm that only snappy network compression is active.
In cryosparcm icli, use the following commands:
from cryosparc_compute import database_management
mongo_uri = database_management.get_mongo_uri("meteor", admin=True)
mongo_client = database_management.try_get_pymongo_client(
mongo_uri,
directConnection=False,
)
admin_db = mongo_client.get_database("admin")
admin_db.command("serverStatus")['network']
You should see an output like:
{'bytesIn': 30816769444,
'bytesOut': 569829498218,
'physicalBytesIn': 30816769444,
'physicalBytesOut': 569829498218,
'numRequests': 97083232,
'compression': {'snappy': {'compressor': {'bytesIn': 0, 'bytesOut': 0},
'decompressor': {'bytesIn': 0, 'bytesOut': 0}}},
'serviceExecutorTaskStats': {'executor': 'passthrough',
'threadsRunning': 201}}
The compression line confirms that only snappy compression is enabled rather than zlib.