CVE-2025-65957: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Intercore-Productions Core-Bot
Core Bot Is an Open Source discord bot made for maple hospital servers. Prior to commit dffe050, the API keys (SUPABASE_API_KEY, TOKEN) are loaded using environment variables, but there are cases in code (error handling, summaries, webhooks) where configuration summaries may inadvertently leak sensitive data (e.g., by failing to redact data in summary embeds or logs). This issue has been patched via commit dffe050.
AI Analysis
Technical Summary
CVE-2025-65957 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Core-Bot, an open-source Discord bot developed by Intercore-Productions, primarily used in Maple Hospital servers. The vulnerability arises from improper handling of sensitive configuration data, specifically API keys like SUPABASE_API_KEY and TOKEN, which are loaded via environment variables. Prior to commit dffe050, certain parts of the bot's code—particularly in error handling routines, summary generation, and webhook message construction—failed to redact these sensitive values before including them in logs or embedded messages. This oversight could lead to unauthorized disclosure of critical credentials to users or systems that should not have access, thereby compromising the confidentiality of the environment. The vulnerability requires an attacker to have some level of privileges (low privileges) and user interaction, as indicated by the CVSS vector (AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:L/SI:H/SA:L). The attack complexity is high, meaning exploitation is not trivial, but the impact on confidentiality, integrity, and availability is severe, as leaked API keys could be used to access backend services, modify data, or disrupt operations. The issue was addressed in commit dffe050, which introduced proper redaction of sensitive information in all relevant outputs. No known exploits have been reported in the wild as of the publication date. Organizations using Core-Bot versions prior to this patch are at risk and should update promptly. The vulnerability highlights the importance of secure handling of environment variables and careful sanitization of logs and user-facing messages in software development.
Potential Impact
For European organizations, especially those operating healthcare-related Discord communities or using Core-Bot for server management, this vulnerability poses a significant risk. Exposure of API keys can lead to unauthorized access to backend databases, user data, or other integrated services, potentially resulting in data breaches, service disruptions, or unauthorized modifications. Given the bot's use in Maple Hospital servers, there is an elevated risk to sensitive health-related information or operational continuity. The compromise of API keys could also facilitate lateral movement within organizational networks or cloud environments, increasing the scope of impact. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting personal data, and such a leak could lead to compliance violations and financial penalties. The high CVSS score (8.8) reflects the critical nature of the threat, emphasizing the need for immediate remediation. Although no active exploits are known, the public disclosure of the vulnerability increases the risk of future attacks, particularly targeting organizations that delay patching. The impact extends beyond confidentiality to integrity and availability, as attackers could manipulate or disrupt services using the exposed credentials.
Mitigation Recommendations
1. Immediately update Core-Bot to the patched version including commit dffe050 or later to ensure proper redaction of sensitive information. 2. Conduct a thorough audit of existing logs, summaries, and webhook messages to identify and remove any previously leaked API keys or sensitive data. 3. Rotate all potentially exposed API keys (SUPABASE_API_KEY, TOKEN) to invalidate any compromised credentials. 4. Implement strict access controls on logs and monitoring systems to limit exposure of sensitive information to authorized personnel only. 5. Enhance development practices by enforcing environment variable handling policies that prevent direct logging or embedding of secrets. 6. Use automated scanning tools to detect accidental exposure of secrets in code, logs, or configuration files. 7. Educate developers and administrators on secure coding and operational practices related to secret management and error handling. 8. Monitor Discord server activities and webhook usage for unusual behavior that could indicate exploitation attempts. 9. Consider deploying runtime application self-protection (RASP) or similar technologies to detect and block unauthorized data disclosures in real time. 10. Establish incident response procedures specifically addressing potential credential leaks and their remediation.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden
CVE-2025-65957: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Intercore-Productions Core-Bot
Description
Core Bot Is an Open Source discord bot made for maple hospital servers. Prior to commit dffe050, the API keys (SUPABASE_API_KEY, TOKEN) are loaded using environment variables, but there are cases in code (error handling, summaries, webhooks) where configuration summaries may inadvertently leak sensitive data (e.g., by failing to redact data in summary embeds or logs). This issue has been patched via commit dffe050.
AI-Powered Analysis
Technical Analysis
CVE-2025-65957 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Core-Bot, an open-source Discord bot developed by Intercore-Productions, primarily used in Maple Hospital servers. The vulnerability arises from improper handling of sensitive configuration data, specifically API keys like SUPABASE_API_KEY and TOKEN, which are loaded via environment variables. Prior to commit dffe050, certain parts of the bot's code—particularly in error handling routines, summary generation, and webhook message construction—failed to redact these sensitive values before including them in logs or embedded messages. This oversight could lead to unauthorized disclosure of critical credentials to users or systems that should not have access, thereby compromising the confidentiality of the environment. The vulnerability requires an attacker to have some level of privileges (low privileges) and user interaction, as indicated by the CVSS vector (AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:L/SI:H/SA:L). The attack complexity is high, meaning exploitation is not trivial, but the impact on confidentiality, integrity, and availability is severe, as leaked API keys could be used to access backend services, modify data, or disrupt operations. The issue was addressed in commit dffe050, which introduced proper redaction of sensitive information in all relevant outputs. No known exploits have been reported in the wild as of the publication date. Organizations using Core-Bot versions prior to this patch are at risk and should update promptly. The vulnerability highlights the importance of secure handling of environment variables and careful sanitization of logs and user-facing messages in software development.
Potential Impact
For European organizations, especially those operating healthcare-related Discord communities or using Core-Bot for server management, this vulnerability poses a significant risk. Exposure of API keys can lead to unauthorized access to backend databases, user data, or other integrated services, potentially resulting in data breaches, service disruptions, or unauthorized modifications. Given the bot's use in Maple Hospital servers, there is an elevated risk to sensitive health-related information or operational continuity. The compromise of API keys could also facilitate lateral movement within organizational networks or cloud environments, increasing the scope of impact. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting personal data, and such a leak could lead to compliance violations and financial penalties. The high CVSS score (8.8) reflects the critical nature of the threat, emphasizing the need for immediate remediation. Although no active exploits are known, the public disclosure of the vulnerability increases the risk of future attacks, particularly targeting organizations that delay patching. The impact extends beyond confidentiality to integrity and availability, as attackers could manipulate or disrupt services using the exposed credentials.
Mitigation Recommendations
1. Immediately update Core-Bot to the patched version including commit dffe050 or later to ensure proper redaction of sensitive information. 2. Conduct a thorough audit of existing logs, summaries, and webhook messages to identify and remove any previously leaked API keys or sensitive data. 3. Rotate all potentially exposed API keys (SUPABASE_API_KEY, TOKEN) to invalidate any compromised credentials. 4. Implement strict access controls on logs and monitoring systems to limit exposure of sensitive information to authorized personnel only. 5. Enhance development practices by enforcing environment variable handling policies that prevent direct logging or embedding of secrets. 6. Use automated scanning tools to detect accidental exposure of secrets in code, logs, or configuration files. 7. Educate developers and administrators on secure coding and operational practices related to secret management and error handling. 8. Monitor Discord server activities and webhook usage for unusual behavior that could indicate exploitation attempts. 9. Consider deploying runtime application self-protection (RASP) or similar technologies to detect and block unauthorized data disclosures in real time. 10. Establish incident response procedures specifically addressing potential credential leaks and their remediation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-18T16:14:56.693Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69264a57ca41832e1e4ac27f
Added to database: 11/26/2025, 12:31:19 AM
Last enriched: 12/3/2025, 4:24:19 AM
Last updated: 1/10/2026, 10:16:09 PM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.