CVE-2025-7974
BaseFortify
Publication date: 2025-09-02
Last updated on: 2025-09-04
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rocket.chat | rocket.chat | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-7974 is an information disclosure vulnerability in rocket.chat caused by incorrect authorization in its web service, which listens on TCP port 3000 by default. This flaw allows remote attackers to disclose sensitive information within the application context without requiring authentication. Exploiting this vulnerability requires high attack complexity but does not affect the integrity or availability of the system. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing remote attackers to access sensitive information from your rocket.chat installation without needing to authenticate. Although the impact on confidentiality is considered low, unauthorized disclosure of sensitive data could lead to privacy concerns or information leakage within your organization. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if the rocket.chat web service is running and listening on TCP port 3000, which is the default port affected. A network scan command such as 'nmap -p 3000 <target-ip>' can help identify if the service is exposed. Additionally, reviewing the rocket.chat version installed can help determine if it is vulnerable, as versions prior to 7.8.0, 7.7.2, 7.6.4, 7.5.3, 7.4.4, and 7.3.6 are affected. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade rocket.chat to one of the fixed versions: 7.8.0, 7.7.2, 7.6.4, 7.5.3, 7.4.4, or 7.3.6. Since the vulnerability is due to incorrect authorization in the web service, applying these updates will resolve the issue. Additionally, restricting access to TCP port 3000 from untrusted networks can reduce exposure until the update is applied. [1]