A vulnerability, which was classified as problematic, has been found in RocketChat up to 7.6.1. This issue affects the function parseMessage of the file /apps/meteor/app/irc/server/servers/RFC2813/parseMessage.js. The manipulation of the argument line leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://gist.github.com/mmmsssttt404/0fcda3b3e85edafc4eaa6816aa252deb | Product |
https://github.com/RocketChat/Rocket.Chat/pull/35711 | Exploit Issue Tracking Patch |
https://vuldb.com/?ctiid.311663 | Permissions Required VDB Entry |
https://vuldb.com/?id.311663 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.585751 | Third Party Advisory VDB Entry |
https://github.com/RocketChat/Rocket.Chat/pull/35711 | Exploit Issue Tracking Patch |
Configurations
History
10 Jul 2025, 16:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-09 20:15
Updated : 2025-07-10 16:24
NVD link : CVE-2025-5892
Mitre link : CVE-2025-5892
CVE.ORG link : CVE-2025-5892
JSON object : View
Products Affected
rocket.chat
- rocket.chat