Skip to main content

CVE-2022-32218: Information Disclosure (CWE-200) in Rocket.chat

Medium
VulnerabilityCVE-2022-32218cvecve-2022-32218cwe-200
Published: Fri Sep 23 2022 (09/23/2022, 18:28:13 UTC)
Source: CVE
Vendor/Project: n/a
Product: Rocket.chat

Description

An information disclosure vulnerability exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 due to the actionLinkHandler method was found to allow Message ID Enumeration with Regex MongoDB queries.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:28:49 UTC

Technical Analysis

CVE-2022-32218 is an information disclosure vulnerability identified in Rocket.Chat versions prior to 4.7.5, 4.8.2, and 5.0. The root cause lies in the actionLinkHandler method, which improperly handles Message ID enumeration through the use of Regex MongoDB queries. This flaw allows an attacker with at least low-level privileges (PR:L) to enumerate message IDs, potentially exposing sensitive message metadata or content. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). However, it does require some level of authentication or access to the Rocket.Chat instance. The vulnerability impacts confidentiality (C:L) but does not affect integrity or availability. The CVSS 3.1 base score is 4.3, categorizing it as a medium severity issue. No known exploits are currently reported in the wild. Rocket.Chat is an open-source team collaboration platform widely used for messaging and communication within organizations. The vulnerability could allow attackers to glean sensitive information from message data, which might be leveraged for further attacks or espionage.

Potential Impact

For European organizations, the impact of CVE-2022-32218 can be significant depending on the sensitivity of the information exchanged via Rocket.Chat. Information disclosure could lead to exposure of confidential communications, internal discussions, or strategic planning details. This could undermine privacy compliance obligations under GDPR, especially if personal data or sensitive corporate information is leaked. Organizations in regulated sectors such as finance, healthcare, and government are particularly at risk due to the potential for reputational damage and regulatory penalties. While the vulnerability does not allow direct code execution or service disruption, the confidentiality breach could facilitate social engineering, insider threat exploitation, or targeted attacks. Given the collaborative nature of Rocket.Chat, the exposure of message metadata or content could also impact trust and operational security within teams.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should promptly upgrade Rocket.Chat instances to versions 4.7.5, 4.8.2, or 5.0 and above where the issue is fixed. Additionally, organizations should review and tighten access controls to Rocket.Chat, ensuring that only authorized users have access to message data. Implementing network segmentation and restricting Rocket.Chat access to trusted internal networks or VPNs can reduce exposure. Monitoring and logging access to Rocket.Chat message data can help detect suspicious enumeration attempts. Organizations should also conduct regular audits of their Rocket.Chat configurations and apply security best practices such as enforcing strong authentication mechanisms (e.g., multi-factor authentication) to limit the risk of unauthorized access. Finally, educating users about the sensitivity of information shared on collaboration platforms and encouraging minimal sharing of sensitive data can reduce potential impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2022-06-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f6ee00acd01a24926470a

Added to database: 5/22/2025, 6:37:20 PM

Last enriched: 7/8/2025, 7:28:49 AM

Last updated: 8/11/2025, 5:36:59 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats