Home

Description

Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0, a NoSQL injection vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows unauthenticated attackers to manipulate MongoDB queries during authentication. The vulnerability is located in the username-based login flow where user-supplied input is directly embedded into a MongoDB query selector without validation. An attacker can inject MongoDB operator expressions (e.g., { $regex: '.*' }) in place of a username string, causing the database query to match unintended user records. This issue has been patched in versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0.

PUBLISHED Reserved 2026-03-05 | Published 2026-03-06 | Updated 2026-03-06 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-943: Improper Neutralization of Special Elements in Data Query Logic

Product status

< 7.10.8
affected

< 7.11.5
affected

< 7.12.5
affected

< 7.13.4
affected

< 8.0.2
affected

< 8.1.1
affected

< 8.2.0
affected

References

github.com/...t.Chat/security/advisories/GHSA-hgq6-9jg2-wf3f

cve.org (CVE-2026-30833)

nvd.nist.gov (CVE-2026-30833)

Download JSON