Description
Rocket.Chat is an open-source, secure, fully customizable communications platform. In Rocket.Chat versions up to 6.12.0, the API endpoint GET /api/v1/oauth-apps.get is exposed to any authenticated user, regardless of their role or permissions. This endpoint returns an OAuth application, as long as the user knows its ID, including potentially sensitive fields such as client_id and client_secret. This vulnerability is fixed in 6.12.0.
Published: 2026-01-14
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized disclosure of OAuth client credentials
Action: Patch immediately
AI Analysis

Impact

Rocket.Chat servers running versions 6.12.0 or earlier allow any authenticated user to call GET /api/v1/oauth-apps.get, which returns the OAuth application data for a known application ID. The endpoint exposes sensitive fields such as client_id and client_secret. This flaw permits an attacker to read credentials that are intended to be protected, potentially enabling unauthorized API calls, data leakage, and compromise of the communication platform. The weakness maps to CWE‑269 and CWE‑862.

Affected Systems

The affected vendor is Rocket.Chat. The product is the Rocket.Chat open‑source communications platform. In all releases earlier than 6.12.0 the vulnerable API endpoint is present. Versions newer than 6.12.0 contain the fix.

Risk and Exploitability

The CVSS score of 7.7 indicates a high severity impact. The EPSS value of less than 1 % suggests that the probability of exploitation is low, but the attack requires only a valid authenticated session and knowledge of an application ID. Based on the description, the ability to enumerate or guess application IDs is inferred; it is not directly stated in the input but is a reasonable deduction. Because the vulnerability is limited to the disclosure of credential information and does not allow arbitrary code execution, it is primarily a confidentiality breach. The issue is not listed in the CISA KEV catalog, so no known active exploits are reported yet.

Generated by OpenCVE AI on April 18, 2026 at 19:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Rocket.Chat to version 6.12.0 or later to remove the vulnerable endpoint
  • Restrict access to the /api/v1/oauth-apps.get endpoint by adding role‑based permissions or disabling the endpoint for non‑admin users
  • After applying the patch, review existing OAuth applications, rotate client secrets, and monitor logs for unusual API usage

Generated by OpenCVE AI on April 18, 2026 at 19:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Rocket.chat
Rocket.chat rocket.chat
CPEs cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*
Vendors & Products Rocket.chat
Rocket.chat rocket.chat

Thu, 15 Jan 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Rocketchat
Rocketchat rocket.chat
Vendors & Products Rocketchat
Rocketchat rocket.chat

Wed, 14 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 18:30:00 +0000

Type Values Removed Values Added
Description Rocket.Chat is an open-source, secure, fully customizable communications platform. In Rocket.Chat versions up to 6.12.0, the API endpoint GET /api/v1/oauth-apps.get is exposed to any authenticated user, regardless of their role or permissions. This endpoint returns an OAuth application, as long as the user knows its ID, including potentially sensitive fields such as client_id and client_secret. This vulnerability is fixed in 6.12.0.
Title Rocket.Chat Unauthorized Access to OAuth App Details
Weaknesses CWE-269
CWE-862
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Rocket.chat Rocket.chat
Rocketchat Rocket.chat
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-14T21:14:08.081Z

Reserved: 2026-01-13T15:47:41.627Z

Link: CVE-2026-23477

cve-icon Vulnrichment

Updated: 2026-01-14T21:14:04.416Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-14T19:16:47.990

Modified: 2026-01-26T18:03:24.090

Link: CVE-2026-23477

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:15:10Z

Weaknesses