Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64709: CWE-918: Server-Side Request Forgery (SSRF) in baptisteArno typebot.io

0
Critical
VulnerabilityCVE-2025-64709cvecve-2025-64709cwe-918
Published: Thu Nov 13 2025 (11/13/2025, 19:42:42 UTC)
Source: CVE Database V5
Vendor/Project: baptisteArno
Product: typebot.io

Description

Typebot is an open-source chatbot builder. In versions prior to 3.13.1, a Server-Side Request Forgery (SSRF) vulnerability in the Typebot webhook block (HTTP Request component) functionality allows authenticated users to make arbitrary HTTP requests from the server, including access to AWS Instance Metadata Service (IMDS). By bypassing IMDSv2 protection through custom header injection, attackers can extract temporary AWS IAM credentials for the EKS node role, leading to complete compromise of the Kubernetes cluster and associated AWS infrastructure. Version 3.13.1 fixes the issue.

AI-Powered Analysis

AILast updated: 11/13/2025, 20:05:23 UTC

Technical Analysis

CVE-2025-64709 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, discovered in the open-source chatbot builder Typebot (baptisteArno project). The vulnerability exists in the webhook block's HTTP Request component in versions prior to 3.13.1. Authenticated users can exploit this flaw to send arbitrary HTTP requests from the Typebot server environment. Critically, this includes the ability to query the AWS Instance Metadata Service (IMDS), which provides temporary IAM credentials to AWS resources. The attacker can bypass IMDSv2 protections, which normally require session tokens, by injecting custom headers that circumvent the security mechanism. Extracted IAM credentials are associated with the EKS node role, granting the attacker extensive permissions within the Kubernetes cluster and AWS infrastructure. This can lead to full cluster compromise, data exfiltration, lateral movement, and persistent control over cloud resources. The vulnerability has a CVSS 3.1 score of 9.6 (critical), reflecting its high impact on confidentiality and integrity, ease of exploitation with only authentication required, and no user interaction needed. Although no known exploits are reported in the wild yet, the severity and potential impact necessitate urgent remediation. The fix was released in Typebot version 3.13.1, which addresses the SSRF issue by properly validating and restricting HTTP requests from the webhook block.

Potential Impact

For European organizations leveraging Typebot in AWS EKS environments, this vulnerability poses a severe risk. Successful exploitation can lead to unauthorized access to sensitive cloud infrastructure, including Kubernetes clusters and AWS resources. This compromises confidentiality by exposing sensitive data and credentials, integrity by allowing attackers to manipulate workloads or configurations, and availability if attackers disrupt services or deploy malicious workloads. The breach of AWS IAM credentials can facilitate lateral movement across cloud services, increasing the attack surface. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) face regulatory and reputational damage if exploited. The requirement for authentication limits exposure to internal or trusted users, but insider threats or compromised credentials can still trigger exploitation. The lack of user interaction needed means automated attacks are feasible once authenticated access is gained. Overall, the vulnerability threatens cloud security posture and operational continuity for European enterprises using vulnerable Typebot versions.

Mitigation Recommendations

1. Immediately upgrade Typebot deployments to version 3.13.1 or later to apply the official patch that fixes the SSRF vulnerability. 2. Restrict access to the Typebot webhook block functionality to only trusted and necessary authenticated users, minimizing the attack surface. 3. Implement strict network segmentation and egress filtering on Kubernetes nodes to prevent unauthorized outbound HTTP requests to sensitive endpoints such as the AWS IMDS. 4. Employ AWS IAM best practices by limiting the permissions of the EKS node role to the minimum necessary, reducing potential damage if credentials are compromised. 5. Monitor logs and network traffic for unusual HTTP requests originating from Typebot servers, especially those targeting IMDS endpoints. 6. Use AWS security features such as IMDSv2 enforcement and AWS Config rules to detect and prevent unauthorized metadata access. 7. Conduct regular security audits and penetration tests focusing on internal SSRF vectors and webhook components. 8. Educate developers and administrators about the risks of SSRF and secure coding practices related to HTTP request handling within chatbot or webhook services.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.921Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691636876c6480bc3217c441

Added to database: 11/13/2025, 7:50:31 PM

Last enriched: 11/13/2025, 8:05:23 PM

Last updated: 11/14/2025, 6:21:20 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats