CVE-2026-29198
Published: 23 April 2026
Summary
CVE-2026-29198 is a critical-severity SQL Injection (CWE-89) vulnerability in Hackerone (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of all information inputs, directly preventing NoSQL injection exploitation in Rocket.Chat's OAuth app handling for CVE-2026-29198.
SI-2 ensures timely identification, reporting, and remediation of software flaws like the NoSQL injection in CVE-2026-29198 via patching.
RA-5 mandates vulnerability scanning to detect and prioritize the NoSQL injection vulnerability in affected Rocket.Chat versions for proactive remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
NoSQL injection in public-facing Rocket.Chat server enables remote unauthenticated exploitation for account takeover (T1190: Exploit Public-Facing Application); resulting access uses obtained valid user account/token (T1078: Valid Accounts).
NVD Description
In Rocket.Chat <8.3.0, <8.2.1, <8.1.2, <8.0.3, <7.13.5, <7.12.6, <7.11.6, and <7.10.9, a NoSQL injection vulnerability can lead to account takeover of the first user with a generated token when an OAuth app is configured.
Deeper analysisAI
CVE-2026-29198 is a NoSQL injection vulnerability (CWE-89) in Rocket.Chat versions earlier than 8.3.0, 8.2.1, 8.1.2, 8.0.3, 7.13.5, 7.12.6, 7.11.6, and 7.10.9. Published on 2026-04-23, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue arises when an OAuth app is configured, enabling injection that targets the first user account with a generated token.
Unauthenticated attackers (PR:N) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and without requiring user interaction (UI:N). Exploitation leads to account takeover of the specified user, granting high-impact access to confidentiality (C:H), integrity (I:H), and availability (A:H) with unchanged scope (S:U).
The GitHub pull request at https://github.com/RocketChat/Rocket.Chat/pull/39492 provides the patch for affected versions. Additional details on the vulnerability disclosure are available in the HackerOne report at https://hackerone.com/reports/3564655.
Details
- CWE(s)