Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-32227: Cleartext Transmission of Sensitive Information (CWE-319) in Rocket.Chat

0
Medium
VulnerabilityCVE-2022-32227cvecve-2022-32227cwe-319
Published: Fri Sep 23 2022 (09/23/2022, 18:28:13 UTC)
Source: CVE
Vendor/Project: n/a
Product: Rocket.Chat

Description

A cleartext transmission of sensitive information exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 relating to Oauth tokens by having the permission "view-full-other-user-info", this could cause an oauth token leak in the product.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:29:06 UTC

Technical Analysis

CVE-2022-32227 is a vulnerability identified in Rocket.Chat versions prior to 4.7.5, 4.8.2, and 5.0.0, involving the cleartext transmission of sensitive OAuth tokens. Specifically, the flaw arises when a user has the permission "view-full-other-user-info," which allows access to OAuth tokens that are transmitted without encryption. This vulnerability falls under CWE-319, which pertains to the cleartext transmission of sensitive information over a network. The issue is that OAuth tokens, which are critical for authentication and authorization, can be intercepted by attackers if transmitted in plaintext, potentially leading to unauthorized access to user accounts or services. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires privileges (permission) but no user interaction, and impacts confidentiality with high impact but no impact on integrity or availability. No known exploits are reported in the wild, but the vulnerability is publicly disclosed and patched in the specified versions. The root cause is the insecure handling of OAuth tokens during transmission, which should ideally be encrypted to prevent interception. This vulnerability is particularly relevant in environments where Rocket.Chat is used for internal or external communications, as leaked tokens could allow attackers to impersonate users or access sensitive information.

Potential Impact

For European organizations using vulnerable versions of Rocket.Chat, this vulnerability poses a significant risk to the confidentiality of OAuth tokens, potentially leading to unauthorized access to internal communication channels or integrated services. Since Rocket.Chat is often used for team collaboration, leaking OAuth tokens could allow attackers to impersonate users, access sensitive conversations, or pivot to other connected systems. This risk is heightened in sectors with strict data protection requirements such as finance, healthcare, and government, where unauthorized access could lead to regulatory violations under GDPR and other compliance frameworks. The lack of impact on integrity and availability means the system's operation might not be disrupted, making detection harder. However, the confidentiality breach alone can lead to data leaks, espionage, or lateral movement within networks. The requirement for the "view-full-other-user-info" permission limits the exposure to users with elevated privileges, but insider threats or compromised accounts with such permissions could exploit this vulnerability. Given the medium CVSS score and the nature of the vulnerability, organizations should prioritize patching to prevent potential token interception and misuse.

Mitigation Recommendations

1. Immediate upgrade of Rocket.Chat instances to versions 4.7.5, 4.8.2, or 5.0.0 or later, where the vulnerability has been fixed. 2. Review and restrict the assignment of the "view-full-other-user-info" permission to only trusted and necessary users to minimize the attack surface. 3. Implement network-level encryption (e.g., enforce HTTPS/TLS) for all Rocket.Chat communications to ensure tokens and other sensitive data are not transmitted in cleartext. 4. Conduct audits of OAuth token usage and monitor for unusual access patterns that might indicate token compromise. 5. Educate administrators and users about the risks of token leakage and encourage the use of multi-factor authentication (MFA) to reduce the impact of token theft. 6. Employ network security controls such as intrusion detection/prevention systems (IDS/IPS) to detect anomalous traffic that could indicate token interception attempts. 7. Regularly review and update security policies related to third-party integrations and OAuth token management within Rocket.Chat environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2022-06-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f6ee00acd01a24926470c

Added to database: 5/22/2025, 6:37:20 PM

Last enriched: 7/8/2025, 7:29:06 AM

Last updated: 2/7/2026, 6:55:16 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats