Vulnerability Description
Rocket.Chat is an open-source, secure, fully customizable communications platform. In Rocket.Chat versions up to 6.12.0, the API endpoint GET /api/v1/oauth-apps.get is exposed to any authenticated user, regardless of their role or permissions. This endpoint returns an OAuth application, as long as the user knows its ID, including potentially sensitive fields such as client_id and client_secret. This vulnerability is fixed in 6.12.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rocket.Chat | Rocket.Chat | < 6.12.0 |
Related Weaknesses (CWE)
References
- https://github.com/RocketChat/Rocket.Chat/security/advisories/GHSA-g4wm-fg3c-g4pExploitThird Party Advisory
FAQ
What is CVE-2026-23477?
CVE-2026-23477 is a vulnerability with a CVSS score of 7.7 (HIGH). Rocket.Chat is an open-source, secure, fully customizable communications platform. In Rocket.Chat versions up to 6.12.0, the API endpoint GET /api/v1/oauth-apps.get is exposed to any authenticated use...
How severe is CVE-2026-23477?
CVE-2026-23477 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23477?
Check the references section above for vendor advisories and patch information. Affected products include: Rocket.Chat Rocket.Chat.