Home

Description

Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0, a critical authentication bypass vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows an attacker to log in to the service as any user with a password set, using any arbitrary password. The vulnerability stems from a missing await keyword when calling an asynchronous password validation function, causing a Promise object (which is always truthy) to be evaluated instead of the actual boolean validation result. This may lead to account takeover of any user whose username is known or guessable. This issue has been patched in versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0.

PUBLISHED Reserved 2026-02-27 | Published 2026-03-06 | Updated 2026-03-06 | Assigner GitHub_M




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-287: Improper Authentication

Product status

< 7.8.6
affected

< 7.9.8
affected

< 7.10.7
affected

< 7.11.4
affected

< 7.12.4
affected

< 7.13.3
affected

< 8.0.0
affected

References

github.com/...t.Chat/security/advisories/GHSA-w6vw-mrgv-69vf

github.com/RocketChat/Rocket.Chat/pull/37143

github.com/...ommit/7d89aae0b1bd08e82b02ceab4c180b430e2c6f07

cve.org (CVE-2026-28514)

nvd.nist.gov (CVE-2026-28514)

Download JSON