Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30833: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in RocketChat Rocket.Chat

0
Medium
VulnerabilityCVE-2026-30833cvecve-2026-30833cwe-943
Published: Fri Mar 06 2026 (03/06/2026, 17:40:36 UTC)
Source: CVE Database V5
Vendor/Project: RocketChat
Product: Rocket.Chat

Description

Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0, a NoSQL injection vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows unauthenticated attackers to manipulate MongoDB queries during authentication. The vulnerability is located in the username-based login flow where user-supplied input is directly embedded into a MongoDB query selector without validation. An attacker can inject MongoDB operator expressions (e.g., { $regex: '.*' }) in place of a username string, causing the database query to match unintended user records. This issue has been patched in versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0.

AI-Powered Analysis

AILast updated: 03/06/2026, 18:16:09 UTC

Technical Analysis

CVE-2026-30833 is a NoSQL injection vulnerability identified in Rocket.Chat, an open-source communication platform widely used for secure messaging. The vulnerability exists in the account service component, specifically within the ddp-streamer microservice's username-based login flow. In affected versions prior to 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0, user-supplied input for the username is directly embedded into MongoDB query selectors without proper sanitization or validation. This improper neutralization of special elements in data query logic (CWE-943) allows an attacker to inject MongoDB operator expressions such as {$regex: '.*'}, which can manipulate the query to match unintended user records. Because the vulnerability is exploitable without authentication or user interaction, an attacker can potentially bypass authentication controls or retrieve unauthorized user information. The flaw impacts the confidentiality and integrity of user data by enabling unauthorized access or impersonation. The vulnerability has been assigned a CVSS 4.0 base score of 6.9, reflecting medium severity due to network attack vector, no privileges or user interaction required, and partial impact on confidentiality and integrity. No known exploits have been reported in the wild to date. The issue has been addressed in multiple patched versions of Rocket.Chat, and users are strongly advised to upgrade to these versions to mitigate the risk. This vulnerability underscores the importance of secure coding practices when constructing NoSQL queries, particularly ensuring that user input is properly validated and sanitized to prevent injection attacks.

Potential Impact

The primary impact of CVE-2026-30833 is unauthorized access to user accounts or data within Rocket.Chat deployments. By exploiting the NoSQL injection flaw, attackers can manipulate authentication queries to bypass login controls or retrieve sensitive user information, compromising confidentiality and integrity. This can lead to account takeover, data leakage, and potential lateral movement within an organization's communication infrastructure. Since Rocket.Chat is often used for secure internal and external communications, exploitation could disrupt business operations, erode trust, and expose sensitive conversations or credentials. The vulnerability requires no authentication or user interaction, increasing the risk of automated or widespread attacks. Although no availability impact is indicated, the breach of confidentiality and integrity alone can have severe consequences for organizations relying on Rocket.Chat for secure messaging. The medium CVSS score reflects these risks, emphasizing the need for prompt remediation to prevent exploitation.

Mitigation Recommendations

1. Immediate upgrade to patched Rocket.Chat versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, or 8.2.0 or later to eliminate the vulnerability. 2. Implement strict input validation and sanitization on all user-supplied data, especially in authentication flows, to ensure no special MongoDB operators or query modifiers can be injected. 3. Refactor query construction to use parameterized queries or safe query builder APIs that separate data from query logic, preventing injection. 4. Conduct code audits focusing on NoSQL query handling to identify and remediate similar injection risks elsewhere in the codebase. 5. Monitor authentication logs for anomalous login attempts or unusual query patterns indicative of injection attempts. 6. Employ Web Application Firewalls (WAFs) or runtime application self-protection (RASP) solutions capable of detecting and blocking NoSQL injection payloads targeting MongoDB. 7. Educate developers on secure coding practices related to NoSQL databases and injection prevention. 8. Maintain an incident response plan to quickly address any suspected exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-05T21:06:44.606Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ab1661c48b3f10ffba1825

Added to database: 3/6/2026, 6:01:05 PM

Last enriched: 3/6/2026, 6:16:09 PM

Last updated: 3/7/2026, 8:13:00 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses