Cyber Posture

CVE-2026-29198

Critical

Published: 23 April 2026

Published
23 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0005 14.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-29198 is a critical-severity SQL Injection (CWE-89) vulnerability in Hackerone (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of all information inputs, directly preventing NoSQL injection exploitation in Rocket.Chat's OAuth app handling for CVE-2026-29198.

prevent

SI-2 ensures timely identification, reporting, and remediation of software flaws like the NoSQL injection in CVE-2026-29198 via patching.

prevent

RA-5 mandates vulnerability scanning to detect and prioritize the NoSQL injection vulnerability in affected Rocket.Chat versions for proactive remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

NoSQL injection in public-facing Rocket.Chat server enables remote unauthenticated exploitation for account takeover (T1190: Exploit Public-Facing Application); resulting access uses obtained valid user account/token (T1078: Valid Accounts).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In Rocket.Chat <8.3.0, <8.2.1, <8.1.2, <8.0.3, <7.13.5, <7.12.6, <7.11.6, and <7.10.9, a NoSQL injection vulnerability can lead to account takeover of the first user with a generated token when an OAuth app is configured.

Deeper analysisAI

CVE-2026-29198 is a NoSQL injection vulnerability (CWE-89) in Rocket.Chat versions earlier than 8.3.0, 8.2.1, 8.1.2, 8.0.3, 7.13.5, 7.12.6, 7.11.6, and 7.10.9. Published on 2026-04-23, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue arises when an OAuth app is configured, enabling injection that targets the first user account with a generated token.

Unauthenticated attackers (PR:N) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and without requiring user interaction (UI:N). Exploitation leads to account takeover of the specified user, granting high-impact access to confidentiality (C:H), integrity (I:H), and availability (A:H) with unchanged scope (S:U).

The GitHub pull request at https://github.com/RocketChat/Rocket.Chat/pull/39492 provides the patch for affected versions. Additional details on the vulnerability disclosure are available in the HackerOne report at https://hackerone.com/reports/3564655.

Details

CWE(s)

Affected Products

Hackerone
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-33755Shared CWE-89
CVE-2025-0063Shared CWE-89
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-32458Shared CWE-89
CVE-2026-24494Shared CWE-89
CVE-2025-26875Shared CWE-89
CVE-2026-26263Shared CWE-89
CVE-2026-30531Shared CWE-89
CVE-2025-7636Shared CWE-89

References