Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30833: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in RocketChat Rocket.Chat

0
Medium
VulnerabilityCVE-2026-30833cvecve-2026-30833cwe-943
Published: Fri Mar 06 2026 (03/06/2026, 17:40:36 UTC)
Source: CVE Database V5
Vendor/Project: RocketChat
Product: Rocket.Chat

Description

Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0, a NoSQL injection vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows unauthenticated attackers to manipulate MongoDB queries during authentication. The vulnerability is located in the username-based login flow where user-supplied input is directly embedded into a MongoDB query selector without validation. An attacker can inject MongoDB operator expressions (e.g., { $regex: '.*' }) in place of a username string, causing the database query to match unintended user records. This issue has been patched in versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 19:47:09 UTC

Technical Analysis

CVE-2026-30833 is a NoSQL injection vulnerability identified in Rocket.Chat, an open-source communication platform widely used for secure messaging. The vulnerability resides in the account service component, specifically within the ddp-streamer microservice that handles authentication. In affected versions prior to 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0, the username-based login flow improperly embeds user-supplied input directly into MongoDB query selectors without sanitization or validation. This improper neutralization of special elements (CWE-943) enables an attacker to inject MongoDB operator expressions such as {$regex: '.*'}, which can manipulate the query logic to match unintended user records. As a result, an unauthenticated attacker can bypass authentication mechanisms by crafting malicious input that alters the query to authenticate as arbitrary users or gain unauthorized access. The vulnerability does not require any privileges or user interaction, making it easier to exploit remotely over the network. The issue has been addressed in the specified patched versions by implementing proper input validation and query construction safeguards. Although no active exploits have been reported, the medium CVSS score of 6.9 reflects the significant risk posed by this injection flaw in a critical authentication path.

Potential Impact

The primary impact of this vulnerability is unauthorized access to Rocket.Chat accounts without valid credentials, undermining the confidentiality and integrity of communications. Attackers exploiting this flaw can impersonate legitimate users, potentially gaining access to sensitive conversations, private channels, and organizational data. This can lead to data leakage, espionage, or further lateral movement within an organization’s network. Since Rocket.Chat is often deployed in enterprise, government, and educational environments for secure collaboration, exploitation could disrupt trust and operational security. Additionally, unauthorized access could enable attackers to escalate privileges or deploy further attacks such as social engineering or malware distribution. The vulnerability affects all organizations using vulnerable Rocket.Chat versions, with a higher risk for those with sensitive or regulated data. The lack of required authentication and user interaction increases the likelihood of automated exploitation attempts if weaponized. However, no known exploits in the wild currently reduce immediate widespread impact but do not eliminate future risk.

Mitigation Recommendations

Organizations should immediately upgrade Rocket.Chat to one of the patched versions: 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, or 8.2.0. If upgrading is not immediately feasible, implement strict input validation and sanitization on the username fields at the application or proxy level to block injection patterns such as MongoDB operators. Employ Web Application Firewalls (WAFs) with custom rules to detect and block NoSQL injection payloads targeting the login endpoint. Monitor authentication logs for anomalous login attempts or patterns indicative of injection attacks. Conduct a thorough review of user account access and audit for suspicious activity. Limit exposure by restricting access to the Rocket.Chat service to trusted networks or VPNs where possible. Educate development teams on secure coding practices to prevent injection flaws, emphasizing the importance of parameterized queries or query builders that separate data from code. Finally, maintain up-to-date backups and incident response plans to quickly recover in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-05T21:06:44.606Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ab1661c48b3f10ffba1825

Added to database: 3/6/2026, 6:01:05 PM

Last enriched: 3/13/2026, 7:47:09 PM

Last updated: 4/20/2026, 7:16:25 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses