Rocket.Chat

6 CVEs product

Monthly

CVE-2026-22560 Monitor

An open redirect vulnerability in Rocket.Chat versions prior to 8.4.0 allows users to be redirected to arbitrary URLs by manipulating parameters within a SAML endpoint.

Rocket.Chat Open Redirect Rocket Chat
NVD GitHub VulDB
EPSS
0.0%
CVE-2026-30833 MEDIUM This Month

Unauthenticated NoSQL injection in Rocket.Chat's authentication service allows attackers to manipulate MongoDB queries by injecting operator expressions into username fields, potentially bypassing login controls and accessing unintended user accounts. The vulnerability affects versions prior to 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0, with no patch currently available for affected deployments.

Code Injection Rocket.Chat
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-30831 CRITICAL Act Now

Auth bypass in Rocket.Chat before 7.10.8+. Second auth bypass CVE.

Authentication Bypass Rocket.Chat
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-28514 CRITICAL Act Now

Auth bypass in Rocket.Chat before 7.8.6+. Multiple versions affected.

Authentication Bypass Rocket.Chat
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-23477 HIGH POC This Week

Rocket.Chat versions prior to 6.12.0 expose the OAuth applications API endpoint to any authenticated user, allowing disclosure of sensitive credentials including client IDs and secrets regardless of user role or permissions. An attacker with valid credentials can enumerate OAuth applications and extract their secrets by knowing application IDs, potentially compromising integrated third-party applications. Public exploit code exists for this vulnerability and no patch is currently available.

Privilege Escalation Rocket.Chat
NVD GitHub
CVSS 3.1
7.7
EPSS
0.0%
CVE-2025-5892 MEDIUM POC This Month

A vulnerability, which was classified as problematic, has been found in RocketChat up to 7.6.1. This issue affects the function parseMessage of the file /apps/meteor/app/irc/server/servers/RFC2813/parseMessage.js. The manipulation of the argument line leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Denial Of Service Rocket.Chat
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.2%
CVE-2026-22560
EPSS 0%
Monitor

An open redirect vulnerability in Rocket.Chat versions prior to 8.4.0 allows users to be redirected to arbitrary URLs by manipulating parameters within a SAML endpoint.

Rocket.Chat Open Redirect Rocket Chat
NVD GitHub VulDB
CVE-2026-30833
EPSS 0% CVSS 5.3
MEDIUM This Month

Unauthenticated NoSQL injection in Rocket.Chat's authentication service allows attackers to manipulate MongoDB queries by injecting operator expressions into username fields, potentially bypassing login controls and accessing unintended user accounts. The vulnerability affects versions prior to 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0, with no patch currently available for affected deployments.

Code Injection Rocket.Chat
NVD GitHub VulDB
CVE-2026-30831
EPSS 0% CVSS 9.8
CRITICAL Act Now

Auth bypass in Rocket.Chat before 7.10.8+. Second auth bypass CVE.

Authentication Bypass Rocket.Chat
NVD GitHub VulDB
CVE-2026-28514
EPSS 0% CVSS 9.8
CRITICAL Act Now

Auth bypass in Rocket.Chat before 7.8.6+. Multiple versions affected.

Authentication Bypass Rocket.Chat
NVD GitHub VulDB
CVE-2026-23477
EPSS 0% CVSS 7.7
HIGH POC This Week

Rocket.Chat versions prior to 6.12.0 expose the OAuth applications API endpoint to any authenticated user, allowing disclosure of sensitive credentials including client IDs and secrets regardless of user role or permissions. An attacker with valid credentials can enumerate OAuth applications and extract their secrets by knowing application IDs, potentially compromising integrated third-party applications. Public exploit code exists for this vulnerability and no patch is currently available.

Privilege Escalation Rocket.Chat
NVD GitHub
CVE-2025-5892
EPSS 0% CVSS 4.3
MEDIUM POC This Month

A vulnerability, which was classified as problematic, has been found in RocketChat up to 7.6.1. This issue affects the function parseMessage of the file /apps/meteor/app/irc/server/servers/RFC2813/parseMessage.js. The manipulation of the argument line leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Denial Of Service Rocket.Chat
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy