CVE-2025-5892

A vulnerability, which was classified as problematic, has been found in RocketChat up to 7.6.1. This issue affects the function parseMessage of the file /apps/meteor/app/irc/server/servers/RFC2813/parseMessage.js. The manipulation of the argument line leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://gist.github.com/mmmsssttt404/0fcda3b3e85edafc4eaa6816aa252deb Product
https://github.com/RocketChat/Rocket.Chat/pull/35711 Exploit Issue Tracking Patch
https://vuldb.com/?ctiid.311663 Permissions Required VDB Entry
https://vuldb.com/?id.311663 Third Party Advisory VDB Entry
https://vuldb.com/?submit.585751 Third Party Advisory VDB Entry
https://github.com/RocketChat/Rocket.Chat/pull/35711 Exploit Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*

History

10 Jul 2025, 16:24

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-09 20:15

Updated : 2025-07-10 16:24


NVD link : CVE-2025-5892

Mitre link : CVE-2025-5892

CVE.ORG link : CVE-2025-5892


JSON object : View

Products Affected

rocket.chat

  • rocket.chat
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-1333

Inefficient Regular Expression Complexity