A vulnerability, which was classified as problematic, has been found in RocketChat up to 7.6.1. This issue affects the function parseMessage of the file /apps/meteor/app/irc/server/servers/RFC2813/parseMessage.js. The manipulation of the argument line leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
https://vuldb.com/?submit.585751
https://vuldb.com/?ctiid.311663
https://github.com/RocketChat/Rocket.Chat/pull/35711
https://gist.github.com/mmmsssttt404/0fcda3b3e85edafc4eaa6816aa252deb
Published: 2025-06-09
Updated: 2025-06-12
Base Score: 4
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P
Severity: Medium
Base Score: 4.3
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Severity: Medium
Base Score: 2.1
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Severity: Low
EPSS: 0.00039