Description
Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0, a critical authentication bypass vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows an attacker to log in to the service as any user with a password set, using any arbitrary password. The vulnerability stems from a missing await keyword when calling an asynchronous password validation function, causing a Promise object (which is always truthy) to be evaluated instead of the actual boolean validation result. This may lead to account takeover of any user whose username is known or guessable. This issue has been patched in versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0.
Published: 2026-03-06
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass (Account Takeover)
Action: Immediate Patch
AI Analysis

Impact

A missing await keyword in Rocket.Chat’s ddp-streamer microservice causes the asynchronous password validator to return a Promise object that is always truthy. As a result, any submitted password is accepted for any username that has a password set, allowing an attacker to authenticate as that user. Because the bypass removes the need for a correct password, the vulnerability can lead to full account takeover, compromising confidential user data and sensitive communications. The flaw is a classic example of improper authentication, mapped to CWE‑287.

Affected Systems

All Rocket.Chat instances running a version earlier than the patched releases 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3 or 8.0.0 are affected. The issue resides specifically in the Enterprise Edition ddp-streamer microservice.

Risk and Exploitability

The CVSS score is 9.3, classifying the flaw as critical, while the EPSS score is less than 1%, indicating a low current probability of exploitation. It is not listed in CISA’s KEV catalog. The likely attack vector is remote via the exposed authentication endpoint of the ddp-streamer service; based on the description, it is inferred that an attacker can perform the bypass by supplying any password after knowing a valid username.

Generated by OpenCVE AI on April 16, 2026 at 11:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Rocket.Chat patch or upgrade to any release newer than 7.8.6 (including 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, 8.0.0 or later).
  • If an immediate upgrade is not possible, restrict access to the ddp-streamer service by firewall rules or IP‑whitelisting to trusted administrators and monitor authentication logs for suspicious activity.
  • Remove or disable the ddp-streamer microservice from non‑essential deployments until the vulnerability can be patched, thereby eliminating the critical authentication bypass path.

Generated by OpenCVE AI on April 16, 2026 at 11:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Rocket.chat
Rocket.chat rocket.chat
CPEs cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*
cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc0:*:*:*:*:*:*
cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc5:*:*:*:*:*:*
Vendors & Products Rocket.chat
Rocket.chat rocket.chat
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 09 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Rocketchat
Rocketchat rocket.chat
Vendors & Products Rocketchat
Rocketchat rocket.chat

Fri, 06 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0, a critical authentication bypass vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows an attacker to log in to the service as any user with a password set, using any arbitrary password. The vulnerability stems from a missing await keyword when calling an asynchronous password validation function, causing a Promise object (which is always truthy) to be evaluated instead of the actual boolean validation result. This may lead to account takeover of any user whose username is known or guessable. This issue has been patched in versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0.
Title Rocket.Chat: Users can login with any password via the EE ddp-streamer-service
Weaknesses CWE-287
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Rocket.chat Rocket.chat
Rocketchat Rocket.chat
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T03:56:35.920Z

Reserved: 2026-02-27T20:57:47.710Z

Link: CVE-2026-28514

cve-icon Vulnrichment

Updated: 2026-03-09T14:57:17.148Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T18:16:19.103

Modified: 2026-03-18T16:10:07.460

Link: CVE-2026-28514

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:30:15Z

Weaknesses