A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.Referenceshttps://jira.mongodb.org/browse/SERVER-119319