CVE-2026-29198
Rocket.Chat · Rocket.Chat
A NoSQL injection vulnerability in Rocket.Chat allows unauthenticated attackers to perform account takeovers of the first user when a specific OAuth configuration is present.
Executive summary
A critical NoSQL injection vulnerability in Rocket.Chat poses a severe risk of unauthorized account takeover, potentially granting attackers full administrative control over the platform.
Vulnerability
This is a NoSQL injection vulnerability occurring within the application's OAuth handling logic. The flaw allows unauthenticated remote attackers to manipulate database queries to gain unauthorized access to user accounts.
Business impact
The exploitation of this vulnerability carries a critical business impact, as evidenced by its 9.8 CVSS score. Successful execution allows for account takeover, leading to potential data breaches, unauthorized disclosure of sensitive internal communications, and a complete compromise of the platform's integrity.
Remediation
Immediate Action: Upgrade Rocket.Chat instances to the latest patched version immediately to remediate the injection vector.
Proactive Monitoring: Review authentication logs for unusual login patterns or multiple failed attempts targeting administrative or high-privileged accounts.
Compensating Controls: Deploy a Web Application Firewall (WAF) with updated rulesets configured to detect and block common NoSQL injection patterns targeting OAuth endpoints.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Given the critical nature of this vulnerability and the potential for full account takeover, administrators must prioritize patching. Failure to update leaves the organization vulnerable to credential theft and lateral movement within the environment.