Vulnerability Description
A vulnerability, which was classified as problematic, has been found in RocketChat up to 7.6.1. This issue affects the function parseMessage of the file /apps/meteor/app/irc/server/servers/RFC2813/parseMessage.js. The manipulation of the argument line leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rocket.Chat | Rocket.Chat | <= 7.6.1 |
Related Weaknesses (CWE)
References
- https://gist.github.com/mmmsssttt404/0fcda3b3e85edafc4eaa6816aa252debProduct
- https://github.com/RocketChat/Rocket.Chat/pull/35711ExploitIssue TrackingPatch
- https://vuldb.com/?ctiid.311663Permissions RequiredVDB Entry
- https://vuldb.com/?id.311663Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.585751Third Party AdvisoryVDB Entry
- https://github.com/RocketChat/Rocket.Chat/pull/35711ExploitIssue TrackingPatch
FAQ
What is CVE-2025-5892?
CVE-2025-5892 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A vulnerability, which was classified as problematic, has been found in RocketChat up to 7.6.1. This issue affects the function parseMessage of the file /apps/meteor/app/irc/server/servers/RFC2813/par...
How severe is CVE-2025-5892?
CVE-2025-5892 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-5892?
Check the references section above for vendor advisories and patch information. Affected products include: Rocket.Chat Rocket.Chat.