Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.3
Old Rocket.Chat versions allow attackers to log in with any password
CVE-2026-28514
Summary
Old versions of Rocket.Chat had a flaw that let attackers log in as any user with a known or guessable username, using any password they chose. This could lead to unauthorized access to user accounts. If you're using an affected version, update to the latest Rocket.Chat version to fix the problem.
Original title
Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0, a critical authentication bypass vulner...
Original description
Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0, a critical authentication bypass vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows an attacker to log in to the service as any user with a password set, using any arbitrary password. The vulnerability stems from a missing await keyword when calling an asynchronous password validation function, causing a Promise object (which is always truthy) to be evaluated instead of the actual boolean validation result. This may lead to account takeover of any user whose username is known or guessable. This issue has been patched in versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0.
nvd CVSS4.0
9.3
Vulnerability type
CWE-287
Improper Authentication
Published: 6 Mar 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026