๐Ÿ” CVE Alert

CVE-2026-28514

UNKNOWN 0.0

Rocket.Chat: Users can login with any password via the EE ddp-streamer-service

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0, a critical authentication bypass vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows an attacker to log in to the service as any user with a password set, using any arbitrary password. The vulnerability stems from a missing await keyword when calling an asynchronous password validation function, causing a Promise object (which is always truthy) to be evaluated instead of the actual boolean validation result. This may lead to account takeover of any user whose username is known or guessable. This issue has been patched in versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0.

CWE CWE-287
Vendor rocketchat
Product rocket.chat
Published Mar 6, 2026
Last Updated Mar 11, 2026
Stay Ahead of the Next One

Get instant alerts for rocketchat rocket.chat

Be the first to know when new unknown vulnerabilities affecting rocketchat rocket.chat are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

RocketChat / Rocket.Chat
< 7.8.6 < 7.9.8 < 7.10.7 < 7.11.4 < 7.12.4 < 7.13.3 < 8.0.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/RocketChat/Rocket.Chat/security/advisories/GHSA-w6vw-mrgv-69vf github.com: https://github.com/RocketChat/Rocket.Chat/pull/37143 github.com: https://github.com/RocketChat/Rocket.Chat/commit/7d89aae0b1bd08e82b02ceab4c180b430e2c6f07