CVE-2025-64706: CWE-639: Authorization Bypass Through User-Controlled Key in baptisteArno typebot.io
Typebot is an open-source chatbot builder. In version 3.9.0 up to but excluding version 3.13.0, an Insecure Direct Object Reference (IDOR) vulnerability exists in the API token management endpoint. An authenticated attacker can delete any user's API token and retrieve its value by simply knowing the target user's ID and token ID, without requiring authorization checks. Version 3.13.0 fixes the issue.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-64706 affects the open-source chatbot builder typebot.io in versions from 3.9.0 up to but excluding 3.13.0. It is classified as an Insecure Direct Object Reference (IDOR) vulnerability, specifically CWE-639, which allows an authenticated attacker to bypass authorization controls in the API token management endpoint. By knowing a target user's ID and token ID, the attacker can delete any user's API token or retrieve its value without proper authorization checks. This means that an attacker with low privileges can manipulate or steal API tokens belonging to other users, potentially gaining unauthorized access to chatbot services or integrations that rely on these tokens. The vulnerability impacts the confidentiality (exposure of API tokens), integrity (unauthorized deletion of tokens), and availability (disruption of token-based services) of the system. The CVSS 3.1 base score is 5.0, indicating a medium severity level, with attack vector being network-based, requiring low privileges and no user interaction, but with high attack complexity. The issue was resolved in version 3.13.0 of typebot.io. No known exploits are currently reported in the wild. The vulnerability stems from insufficient authorization checks in the API token management endpoint, a critical security oversight in access control mechanisms.
Potential Impact
For European organizations, this vulnerability poses a risk to the security of chatbot integrations and automation workflows that rely on typebot.io API tokens. Unauthorized access to API tokens can lead to data leakage, manipulation of chatbot behavior, or disruption of services dependent on these tokens. This could result in exposure of sensitive customer interactions, unauthorized commands executed via chatbots, or denial of service through token deletion. Organizations in sectors such as finance, healthcare, and e-commerce that use chatbots for customer engagement or internal automation may face compliance issues under GDPR if personal data is exposed. The medium severity rating suggests moderate risk, but the ease of exploitation by authenticated users and the potential for lateral movement within organizations elevate the concern. The lack of user interaction requirement means attackers can automate exploitation once they have valid credentials or access to a low-privilege account.
Mitigation Recommendations
1. Upgrade all instances of typebot.io to version 3.13.0 or later, where the vulnerability is patched. 2. Implement strict role-based access controls (RBAC) to limit which users can manage API tokens, minimizing the number of accounts with token management privileges. 3. Monitor API token management endpoints for unusual activity, such as deletion or retrieval requests from unexpected user accounts or IP addresses. 4. Enforce multi-factor authentication (MFA) for all users with access to token management features to reduce the risk of compromised credentials. 5. Conduct regular audits of API tokens and their usage to detect anomalies or unauthorized access. 6. If upgrading immediately is not feasible, consider implementing compensating controls such as network segmentation or API gateway filtering to restrict access to token management endpoints. 7. Educate developers and administrators about the importance of authorization checks and secure API design to prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-64706: CWE-639: Authorization Bypass Through User-Controlled Key in baptisteArno typebot.io
Description
Typebot is an open-source chatbot builder. In version 3.9.0 up to but excluding version 3.13.0, an Insecure Direct Object Reference (IDOR) vulnerability exists in the API token management endpoint. An authenticated attacker can delete any user's API token and retrieve its value by simply knowing the target user's ID and token ID, without requiring authorization checks. Version 3.13.0 fixes the issue.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-64706 affects the open-source chatbot builder typebot.io in versions from 3.9.0 up to but excluding 3.13.0. It is classified as an Insecure Direct Object Reference (IDOR) vulnerability, specifically CWE-639, which allows an authenticated attacker to bypass authorization controls in the API token management endpoint. By knowing a target user's ID and token ID, the attacker can delete any user's API token or retrieve its value without proper authorization checks. This means that an attacker with low privileges can manipulate or steal API tokens belonging to other users, potentially gaining unauthorized access to chatbot services or integrations that rely on these tokens. The vulnerability impacts the confidentiality (exposure of API tokens), integrity (unauthorized deletion of tokens), and availability (disruption of token-based services) of the system. The CVSS 3.1 base score is 5.0, indicating a medium severity level, with attack vector being network-based, requiring low privileges and no user interaction, but with high attack complexity. The issue was resolved in version 3.13.0 of typebot.io. No known exploits are currently reported in the wild. The vulnerability stems from insufficient authorization checks in the API token management endpoint, a critical security oversight in access control mechanisms.
Potential Impact
For European organizations, this vulnerability poses a risk to the security of chatbot integrations and automation workflows that rely on typebot.io API tokens. Unauthorized access to API tokens can lead to data leakage, manipulation of chatbot behavior, or disruption of services dependent on these tokens. This could result in exposure of sensitive customer interactions, unauthorized commands executed via chatbots, or denial of service through token deletion. Organizations in sectors such as finance, healthcare, and e-commerce that use chatbots for customer engagement or internal automation may face compliance issues under GDPR if personal data is exposed. The medium severity rating suggests moderate risk, but the ease of exploitation by authenticated users and the potential for lateral movement within organizations elevate the concern. The lack of user interaction requirement means attackers can automate exploitation once they have valid credentials or access to a low-privilege account.
Mitigation Recommendations
1. Upgrade all instances of typebot.io to version 3.13.0 or later, where the vulnerability is patched. 2. Implement strict role-based access controls (RBAC) to limit which users can manage API tokens, minimizing the number of accounts with token management privileges. 3. Monitor API token management endpoints for unusual activity, such as deletion or retrieval requests from unexpected user accounts or IP addresses. 4. Enforce multi-factor authentication (MFA) for all users with access to token management features to reduce the risk of compromised credentials. 5. Conduct regular audits of API tokens and their usage to detect anomalies or unauthorized access. 6. If upgrading immediately is not feasible, consider implementing compensating controls such as network segmentation or API gateway filtering to restrict access to token management endpoints. 7. Educate developers and administrators about the importance of authorization checks and secure API design to prevent similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T14:07:42.921Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69161ca8cdc01d12641febbb
Added to database: 11/13/2025, 6:00:08 PM
Last enriched: 11/13/2025, 6:14:37 PM
Last updated: 11/17/2025, 4:07:06 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13283: CWE-352 Cross-Site Request Forgery (CSRF) in Chunghwa Telecom TenderDocTransfer
HighCVE-2025-13261: Path Traversal in lsfusion platform
MediumCVE-2025-13282: CWE-352 Cross-Site Request Forgery (CSRF) in Chunghwa Telecom TenderDocTransfer
HighCVE-2025-13260: SQL Injection in Campcodes Supplier Management System
MediumCVE-2025-13259: SQL Injection in Campcodes Supplier Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.