{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T18:52:07.003","vulnerabilities":[{"cve":{"id":"CVE-2026-28514","sourceIdentifier":"security-advisories@github.com","published":"2026-03-06T18:16:19.103","lastModified":"2026-03-18T16:10:07.460","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0, a critical authentication bypass vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows an attacker to log in to the service as any user with a password set, using any arbitrary password. The vulnerability stems from a missing await keyword when calling an asynchronous password validation function, causing a Promise object (which is always truthy) to be evaluated instead of the actual boolean validation result. This may lead to account takeover of any user whose username is known or guessable. This issue has been patched in versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0."},{"lang":"es","value":"Rocket.Chat es una plataforma de comunicaciones de código abierto, segura y totalmente personalizable. Antes de las versiones 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3 y 8.0.0, existe una vulnerabilidad crítica de omisión de autenticación en el servicio de cuentas de Rocket.Chat utilizado en el microservicio ddp-streamer que permite a un atacante iniciar sesión en el servicio como cualquier usuario con una contraseña establecida, utilizando cualquier contraseña arbitraria. La vulnerabilidad se deriva de la ausencia de la palabra clave await al llamar a una función asíncrona de validación de contraseña, lo que provoca que se evalúe un objeto Promise (que siempre es truthy) en lugar del resultado de validación booleano real. Esto puede llevar a la toma de control de la cuenta de cualquier usuario cuyo nombre de usuario sea conocido o adivinable. Este problema ha sido parcheado en las versiones 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3 y 8.0.0."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*","versionEndExcluding":"7.8.6","matchCriteriaId":"FDF1710B-451A-45DE-92B2-5EB0DB847964"},{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*","versionStartIncluding":"7.9.0","versionEndExcluding":"7.9.8","matchCriteriaId":"624B69A1-3489-4BC3-9A47-AC5AC4743CE8"},{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*","versionStartIncluding":"7.10.0","versionEndExcluding":"7.10.7","matchCriteriaId":"3A1AA90D-199C-4AA9-96CA-3CFD7E043572"},{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*","versionStartIncluding":"7.11.0","versionEndExcluding":"7.11.4","matchCriteriaId":"5A10B0BA-17CC-4AFF-A2F4-20E5252EB0F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*","versionStartIncluding":"7.12.0","versionEndExcluding":"7.12.4","matchCriteriaId":"B33BA4A7-71F3-42EE-A29B-936AA166CA45"},{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*","versionStartIncluding":"7.13.0","versionEndExcluding":"7.13.3","matchCriteriaId":"50874BCF-361F-416D-9A32-E6C43E12E218"},{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc0:*:*:*:*:*:*","matchCriteriaId":"92CEECD0-CC4A-4798-9139-F14FEE8608FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc1:*:*:*:*:*:*","matchCriteriaId":"BBCB3AD1-0707-49FB-B837-811D87494991"},{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc2:*:*:*:*:*:*","matchCriteriaId":"4C6204C2-7FFC-4D41-A623-D19A47469A0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc3:*:*:*:*:*:*","matchCriteriaId":"6D9076FE-EDA5-49E8-BB23-2B3FF17F70F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc4:*:*:*:*:*:*","matchCriteriaId":"140941C3-08BF-4920-AA63-ED00DE58AF66"},{"vulnerable":true,"criteria":"cpe:2.3:a:rocket.chat:rocket.chat:8.0.0:rc5:*:*:*:*:*:*","matchCriteriaId":"3DAE103A-461A-4379-B322-577711AA0EC0"}]}]}],"references":[{"url":"https://github.com/RocketChat/Rocket.Chat/commit/7d89aae0b1bd08e82b02ceab4c180b430e2c6f07","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/RocketChat/Rocket.Chat/pull/37143","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/RocketChat/Rocket.Chat/security/advisories/GHSA-w6vw-mrgv-69vf","source":"security-advisories@github.com","tags":["Mitigation","Vendor Advisory"]}]}}]}