Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0, a NoSQL injection vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows unauthenticated attackers to manipulate MongoDB queries during authentication. The vulnerability is located in the username-based login flow where user-supplied input is directly embedded into a MongoDB query selector without validation. An attacker can inject MongoDB operator expressions (e.g., { $regex: '.*' }) in place of a username string, causing the database query to match unintended user records. This issue has been patched in versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0.
References
| Link | Resource |
|---|---|
| https://github.com/RocketChat/Rocket.Chat/security/advisories/GHSA-hgq6-9jg2-wf3f | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
13 Mar 2026, 18:46
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| References | () https://github.com/RocketChat/Rocket.Chat/security/advisories/GHSA-hgq6-9jg2-wf3f - Vendor Advisory | |
| First Time |
Rocket.chat
Rocket.chat rocket.chat |
|
| CPE | cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:* cpe:2.3:a:rocket.chat:rocket.chat:8.2.0:rc1:*:*:*:*:*:* cpe:2.3:a:rocket.chat:rocket.chat:8.2.0:rc0:*:*:*:*:*:* cpe:2.3:a:rocket.chat:rocket.chat:8.2.0:rc2:*:*:*:*:*:* |
06 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 18:16
Updated : 2026-03-13 18:46
NVD link : CVE-2026-30833
Mitre link : CVE-2026-30833
CVE.ORG link : CVE-2026-30833
JSON object : View
Products Affected
rocket.chat
- rocket.chat
CWE
CWE-943
Improper Neutralization of Special Elements in Data Query Logic
