6.9
CVE-2026-30833
- EPSS 0.02%
- Veröffentlicht 06.03.2026 17:40:36
- Zuletzt bearbeitet 13.03.2026 18:46:27
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0, a NoSQL injection vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows unauthenticated attackers to manipulate MongoDB queries during authentication. The vulnerability is located in the username-based login flow where user-supplied input is directly embedded into a MongoDB query selector without validation. An attacker can inject MongoDB operator expressions (e.g., { $regex: '.*' }) in place of a username string, causing the database query to match unintended user records. This issue has been patched in versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rocket.Chat ≫ Rocket.Chat Version < 7.10.8
Rocket.Chat ≫ Rocket.Chat Version >= 7.11.0 < 7.11.5
Rocket.Chat ≫ Rocket.Chat Version >= 7.12.0 < 7.12.5
Rocket.Chat ≫ Rocket.Chat Version >= 7.13.0 < 7.13.4
Rocket.Chat ≫ Rocket.Chat Version >= 8.0.0 < 8.0.2
Rocket.Chat ≫ Rocket.Chat Version >= 8.1.0 < 8.1.1
Rocket.Chat ≫ Rocket.Chat Version8.2.0 Updaterc0
Rocket.Chat ≫ Rocket.Chat Version8.2.0 Updaterc1
Rocket.Chat ≫ Rocket.Chat Version8.2.0 Updaterc2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.061 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
| security-advisories@github.com | 6.9 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-943 Improper Neutralization of Special Elements in Data Query Logic
The product generates a query intended to access or manipulate data in a data store such as a database, but it does not neutralize or incorrectly neutralizes special elements that can modify the intended logic of the query.