Skip to main content

CVE-2022-32226: Improper Access Control - Generic (CWE-284) in Rocket.Chat

Medium
VulnerabilityCVE-2022-32226cvecve-2022-32226cwe-284
Published: Fri Sep 23 2022 (09/23/2022, 18:28:13 UTC)
Source: CVE
Vendor/Project: n/a
Product: Rocket.Chat

Description

An improper access control vulnerability exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 due to input data in the getUsersOfRoom Meteor server method is not type validated, so that MongoDB query operator objects are accepted by the server, so that instead of a matching rid String a$regex query can be executed, bypassing the room access permission check for every but the first matching room.

AI-Powered Analysis

AILast updated: 07/08/2025, 08:10:29 UTC

Technical Analysis

CVE-2022-32226 is an improper access control vulnerability identified in Rocket.Chat versions prior to 4.7.5, 4.8.2, and 5.0.0. The root cause lies in the lack of type validation for input data in the Meteor server method getUsersOfRoom. Specifically, the method accepts MongoDB query operator objects instead of strictly requiring a room ID (rid) string. This flaw allows an attacker to craft a malicious query using a $regex operator, which bypasses the intended room access permission checks. Consequently, an attacker with at least limited privileges (since the CVSS vector indicates PR:L, meaning low privileges are required) can retrieve user lists from rooms they should not have access to, except for the first matching room. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS score of 4.3 (medium severity) reflects limited confidentiality impact (disclosure of user membership information), no integrity or availability impact, and relatively low complexity of exploitation. No known exploits are reported in the wild as of the publication date. The vulnerability is classified under CWE-284 (Improper Access Control), highlighting a failure to enforce proper authorization checks on sensitive operations. The issue was addressed by Rocket.Chat in versions 4.7.5, 4.8.2, and 5.0.0 by presumably enforcing stricter input validation and access control on the getUsersOfRoom method.

Potential Impact

For European organizations using vulnerable versions of Rocket.Chat, this vulnerability poses a risk of unauthorized disclosure of user membership information within chat rooms. While it does not allow modification or deletion of data, leaking user lists can facilitate further targeted attacks such as social engineering, phishing, or reconnaissance for lateral movement. Organizations relying on Rocket.Chat for internal communications, especially those handling sensitive or regulated data, may face compliance risks under GDPR due to unauthorized access to user information. The impact is more pronounced in sectors with strict privacy requirements such as finance, healthcare, and government. Since the vulnerability requires only low privileges, an insider threat or compromised low-level user account could exploit it to gain unauthorized visibility into communication groups. However, the lack of known active exploitation and the medium severity rating suggest the immediate risk is moderate but should not be ignored.

Mitigation Recommendations

European organizations should promptly upgrade Rocket.Chat instances to versions 4.7.5, 4.8.2, or 5.0.0 or later, where the vulnerability is fixed. Until upgrades are applied, organizations should restrict access to Rocket.Chat servers to trusted networks and enforce strict user authentication and role-based access controls to limit the number of users with access to the getUsersOfRoom functionality. Monitoring and logging access to Meteor server methods can help detect anomalous queries indicative of exploitation attempts. Additionally, organizations should review and harden their Rocket.Chat configuration to disable or restrict API methods that expose sensitive information. Conducting internal audits of user permissions and chat room memberships can reduce the potential impact of unauthorized data disclosure. Finally, educating users about the risks of phishing and social engineering can mitigate follow-on attacks that might leverage information obtained through this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2022-06-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f6b520acd01a249264633

Added to database: 5/22/2025, 6:22:10 PM

Last enriched: 7/8/2025, 8:10:29 AM

Last updated: 8/15/2025, 8:10:24 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats