CVE-2026-29198

Rocket.Chat · Rocket.Chat

A NoSQL injection vulnerability in Rocket.Chat allows unauthenticated attackers to perform account takeovers of the first user when a specific OAuth configuration is present.

Executive summary

A critical NoSQL injection vulnerability in Rocket.Chat poses a severe risk of unauthorized account takeover, potentially granting attackers full administrative control over the platform.

Vulnerability

This is a NoSQL injection vulnerability occurring within the application's OAuth handling logic. The flaw allows unauthenticated remote attackers to manipulate database queries to gain unauthorized access to user accounts.

Business impact

The exploitation of this vulnerability carries a critical business impact, as evidenced by its 9.8 CVSS score. Successful execution allows for account takeover, leading to potential data breaches, unauthorized disclosure of sensitive internal communications, and a complete compromise of the platform's integrity.

Remediation

Immediate Action: Upgrade Rocket.Chat instances to the latest patched version immediately to remediate the injection vector.

Proactive Monitoring: Review authentication logs for unusual login patterns or multiple failed attempts targeting administrative or high-privileged accounts.

Compensating Controls: Deploy a Web Application Firewall (WAF) with updated rulesets configured to detect and block common NoSQL injection patterns targeting OAuth endpoints.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Given the critical nature of this vulnerability and the potential for full account takeover, administrators must prioritize patching. Failure to update leaves the organization vulnerable to credential theft and lateral movement within the environment.