Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64706: CWE-639: Authorization Bypass Through User-Controlled Key in baptisteArno typebot.io

0
Medium
VulnerabilityCVE-2025-64706cvecve-2025-64706cwe-639cwe-284
Published: Thu Nov 13 2025 (11/13/2025, 17:49:29 UTC)
Source: CVE Database V5
Vendor/Project: baptisteArno
Product: typebot.io

Description

Typebot is an open-source chatbot builder. In version 3.9.0 up to but excluding version 3.13.0, an Insecure Direct Object Reference (IDOR) vulnerability exists in the API token management endpoint. An authenticated attacker can delete any user's API token and retrieve its value by simply knowing the target user's ID and token ID, without requiring authorization checks. Version 3.13.0 fixes the issue.

AI-Powered Analysis

AILast updated: 11/13/2025, 18:14:37 UTC

Technical Analysis

The vulnerability identified as CVE-2025-64706 affects the open-source chatbot builder typebot.io in versions from 3.9.0 up to but excluding 3.13.0. It is classified as an Insecure Direct Object Reference (IDOR) vulnerability, specifically CWE-639, which allows an authenticated attacker to bypass authorization controls in the API token management endpoint. By knowing a target user's ID and token ID, the attacker can delete any user's API token or retrieve its value without proper authorization checks. This means that an attacker with low privileges can manipulate or steal API tokens belonging to other users, potentially gaining unauthorized access to chatbot services or integrations that rely on these tokens. The vulnerability impacts the confidentiality (exposure of API tokens), integrity (unauthorized deletion of tokens), and availability (disruption of token-based services) of the system. The CVSS 3.1 base score is 5.0, indicating a medium severity level, with attack vector being network-based, requiring low privileges and no user interaction, but with high attack complexity. The issue was resolved in version 3.13.0 of typebot.io. No known exploits are currently reported in the wild. The vulnerability stems from insufficient authorization checks in the API token management endpoint, a critical security oversight in access control mechanisms.

Potential Impact

For European organizations, this vulnerability poses a risk to the security of chatbot integrations and automation workflows that rely on typebot.io API tokens. Unauthorized access to API tokens can lead to data leakage, manipulation of chatbot behavior, or disruption of services dependent on these tokens. This could result in exposure of sensitive customer interactions, unauthorized commands executed via chatbots, or denial of service through token deletion. Organizations in sectors such as finance, healthcare, and e-commerce that use chatbots for customer engagement or internal automation may face compliance issues under GDPR if personal data is exposed. The medium severity rating suggests moderate risk, but the ease of exploitation by authenticated users and the potential for lateral movement within organizations elevate the concern. The lack of user interaction requirement means attackers can automate exploitation once they have valid credentials or access to a low-privilege account.

Mitigation Recommendations

1. Upgrade all instances of typebot.io to version 3.13.0 or later, where the vulnerability is patched. 2. Implement strict role-based access controls (RBAC) to limit which users can manage API tokens, minimizing the number of accounts with token management privileges. 3. Monitor API token management endpoints for unusual activity, such as deletion or retrieval requests from unexpected user accounts or IP addresses. 4. Enforce multi-factor authentication (MFA) for all users with access to token management features to reduce the risk of compromised credentials. 5. Conduct regular audits of API tokens and their usage to detect anomalies or unauthorized access. 6. If upgrading immediately is not feasible, consider implementing compensating controls such as network segmentation or API gateway filtering to restrict access to token management endpoints. 7. Educate developers and administrators about the importance of authorization checks and secure API design to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.921Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69161ca8cdc01d12641febbb

Added to database: 11/13/2025, 6:00:08 PM

Last enriched: 11/13/2025, 6:14:37 PM

Last updated: 11/17/2025, 4:07:06 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats