CVE-2026-23477: CWE-269: Improper Privilege Management in RocketChat Rocket.Chat
CVE-2026-23477 is a high-severity vulnerability in Rocket. Chat versions prior to 6. 12. 0, involving improper privilege management. Authenticated users can access the GET /api/v1/oauth-apps. get endpoint without proper role or permission checks, allowing them to retrieve sensitive OAuth application details such as client_id and client_secret if they know the application ID. This exposure risks confidentiality but does not affect integrity or availability. The vulnerability requires authentication but no user interaction and can be exploited remotely over the network. It has a CVSS score of 7. 7, indicating a significant security risk.
AI Analysis
Technical Summary
CVE-2026-23477 is a vulnerability classified under CWE-269 (Improper Privilege Management) and CWE-862 (Missing Authorization) affecting Rocket.Chat, an open-source communication platform widely used for secure messaging and collaboration. In versions prior to 6.12.0, the API endpoint GET /api/v1/oauth-apps.get is accessible to any authenticated user regardless of their assigned roles or permissions. This endpoint returns details of OAuth applications if the user provides a valid application ID. Critically, the response includes sensitive fields such as client_id and client_secret, which are credentials used to authenticate OAuth clients. Exposure of these credentials can lead to unauthorized access to OAuth-protected resources, impersonation of legitimate applications, and potential lateral movement within affected environments. The vulnerability does not require user interaction and can be exploited remotely over the network, but does require the attacker to be authenticated on the Rocket.Chat instance. The CVSS v3.1 base score is 7.7, reflecting high severity due to the ease of exploitation (low attack complexity), network vector, and high confidentiality impact, while integrity and availability remain unaffected. No known exploits in the wild have been reported as of the publication date. The issue was addressed in Rocket.Chat version 6.12.0 by enforcing proper authorization checks on the endpoint to restrict access to users with appropriate privileges.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of OAuth credentials used within Rocket.Chat deployments. Unauthorized disclosure of client_id and client_secret can enable attackers to impersonate legitimate OAuth clients, potentially gaining unauthorized access to internal services or third-party integrations relying on these credentials. This can lead to data breaches, unauthorized data access, and compromise of internal communication channels. Given Rocket.Chat's use in sectors such as government, finance, healthcare, and critical infrastructure across Europe, exploitation could disrupt secure communications and expose sensitive organizational data. While the vulnerability does not directly impact system integrity or availability, the indirect effects of compromised OAuth credentials could facilitate further attacks or data exfiltration. Organizations with large user bases or those integrating Rocket.Chat with critical business applications are at higher risk. The requirement for authentication limits exposure to insiders or compromised accounts, but the lack of role-based access control on this endpoint broadens the attack surface within the organization.
Mitigation Recommendations
European organizations should immediately upgrade all Rocket.Chat instances to version 6.12.0 or later to remediate this vulnerability. Until patching is possible, restrict access to the Rocket.Chat API endpoints by implementing network-level controls such as IP whitelisting and VPN access to limit authenticated users to trusted personnel only. Review and tighten user role assignments and permissions within Rocket.Chat to minimize the number of users with access to sensitive API endpoints. Implement monitoring and alerting on unusual API access patterns, especially requests to /api/v1/oauth-apps.get, to detect potential exploitation attempts. Rotate OAuth client secrets associated with Rocket.Chat integrations to invalidate any potentially compromised credentials. Conduct regular audits of OAuth applications registered in Rocket.Chat to ensure only authorized applications exist. Additionally, enforce strong authentication mechanisms (e.g., MFA) for Rocket.Chat users to reduce the risk of account compromise. Finally, educate users and administrators about the importance of safeguarding OAuth credentials and promptly applying security updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2026-23477: CWE-269: Improper Privilege Management in RocketChat Rocket.Chat
Description
CVE-2026-23477 is a high-severity vulnerability in Rocket. Chat versions prior to 6. 12. 0, involving improper privilege management. Authenticated users can access the GET /api/v1/oauth-apps. get endpoint without proper role or permission checks, allowing them to retrieve sensitive OAuth application details such as client_id and client_secret if they know the application ID. This exposure risks confidentiality but does not affect integrity or availability. The vulnerability requires authentication but no user interaction and can be exploited remotely over the network. It has a CVSS score of 7. 7, indicating a significant security risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-23477 is a vulnerability classified under CWE-269 (Improper Privilege Management) and CWE-862 (Missing Authorization) affecting Rocket.Chat, an open-source communication platform widely used for secure messaging and collaboration. In versions prior to 6.12.0, the API endpoint GET /api/v1/oauth-apps.get is accessible to any authenticated user regardless of their assigned roles or permissions. This endpoint returns details of OAuth applications if the user provides a valid application ID. Critically, the response includes sensitive fields such as client_id and client_secret, which are credentials used to authenticate OAuth clients. Exposure of these credentials can lead to unauthorized access to OAuth-protected resources, impersonation of legitimate applications, and potential lateral movement within affected environments. The vulnerability does not require user interaction and can be exploited remotely over the network, but does require the attacker to be authenticated on the Rocket.Chat instance. The CVSS v3.1 base score is 7.7, reflecting high severity due to the ease of exploitation (low attack complexity), network vector, and high confidentiality impact, while integrity and availability remain unaffected. No known exploits in the wild have been reported as of the publication date. The issue was addressed in Rocket.Chat version 6.12.0 by enforcing proper authorization checks on the endpoint to restrict access to users with appropriate privileges.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of OAuth credentials used within Rocket.Chat deployments. Unauthorized disclosure of client_id and client_secret can enable attackers to impersonate legitimate OAuth clients, potentially gaining unauthorized access to internal services or third-party integrations relying on these credentials. This can lead to data breaches, unauthorized data access, and compromise of internal communication channels. Given Rocket.Chat's use in sectors such as government, finance, healthcare, and critical infrastructure across Europe, exploitation could disrupt secure communications and expose sensitive organizational data. While the vulnerability does not directly impact system integrity or availability, the indirect effects of compromised OAuth credentials could facilitate further attacks or data exfiltration. Organizations with large user bases or those integrating Rocket.Chat with critical business applications are at higher risk. The requirement for authentication limits exposure to insiders or compromised accounts, but the lack of role-based access control on this endpoint broadens the attack surface within the organization.
Mitigation Recommendations
European organizations should immediately upgrade all Rocket.Chat instances to version 6.12.0 or later to remediate this vulnerability. Until patching is possible, restrict access to the Rocket.Chat API endpoints by implementing network-level controls such as IP whitelisting and VPN access to limit authenticated users to trusted personnel only. Review and tighten user role assignments and permissions within Rocket.Chat to minimize the number of users with access to sensitive API endpoints. Implement monitoring and alerting on unusual API access patterns, especially requests to /api/v1/oauth-apps.get, to detect potential exploitation attempts. Rotate OAuth client secrets associated with Rocket.Chat integrations to invalidate any potentially compromised credentials. Conduct regular audits of OAuth applications registered in Rocket.Chat to ensure only authorized applications exist. Additionally, enforce strong authentication mechanisms (e.g., MFA) for Rocket.Chat users to reduce the risk of account compromise. Finally, educate users and administrators about the importance of safeguarding OAuth credentials and promptly applying security updates.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-13T15:47:41.627Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6967de03d0ff220b953260fb
Added to database: 1/14/2026, 6:18:43 PM
Last enriched: 1/14/2026, 6:33:06 PM
Last updated: 1/14/2026, 7:02:04 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23497: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in frappe lms
LowCVE-2025-33206: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA NSIGHT Graphics
HighCVE-2026-22819: CWE-366: Race Condition within a Thread in akinloluwami outray
MediumCVE-2025-70747: n/a
HighCVE-2025-63644: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.