CVE-2025-5892 PUBLISHED

RocketChat parseMessage.js parseMessage redos

Assigner: VulDB
Reserved: 09.06.2025 Published: 09.06.2025 Updated: 09.06.2025

A vulnerability, which was classified as problematic, has been found in RocketChat up to 7.6.1. This issue affects the function parseMessage of the file /apps/meteor/app/irc/server/servers/RFC2813/parseMessage.js. The manipulation of the argument line leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 5.3

Product Status

Vendor n/a
Product RocketChat
Versions
  • Version 7.6.0 is affected
  • Version 7.6.1 is affected

Credits

  • mmmsssttt (VulDB User) reporter

References

Problem Types

  • Inefficient Regular Expression Complexity CWE
  • Resource Consumption CWE