Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65957: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Intercore-Productions Core-Bot

0
High
VulnerabilityCVE-2025-65957cvecve-2025-65957cwe-200
Published: Tue Nov 25 2025 (11/25/2025, 23:33:09 UTC)
Source: CVE Database V5
Vendor/Project: Intercore-Productions
Product: Core-Bot

Description

Core Bot Is an Open Source discord bot made for maple hospital servers. Prior to commit dffe050, the API keys (SUPABASE_API_KEY, TOKEN) are loaded using environment variables, but there are cases in code (error handling, summaries, webhooks) where configuration summaries may inadvertently leak sensitive data (e.g., by failing to redact data in summary embeds or logs). This issue has been patched via commit dffe050.

AI-Powered Analysis

AILast updated: 12/03/2025, 04:24:19 UTC

Technical Analysis

CVE-2025-65957 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Core-Bot, an open-source Discord bot developed by Intercore-Productions, primarily used in Maple Hospital servers. The vulnerability arises from improper handling of sensitive configuration data, specifically API keys like SUPABASE_API_KEY and TOKEN, which are loaded via environment variables. Prior to commit dffe050, certain parts of the bot's code—particularly in error handling routines, summary generation, and webhook message construction—failed to redact these sensitive values before including them in logs or embedded messages. This oversight could lead to unauthorized disclosure of critical credentials to users or systems that should not have access, thereby compromising the confidentiality of the environment. The vulnerability requires an attacker to have some level of privileges (low privileges) and user interaction, as indicated by the CVSS vector (AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:L/SI:H/SA:L). The attack complexity is high, meaning exploitation is not trivial, but the impact on confidentiality, integrity, and availability is severe, as leaked API keys could be used to access backend services, modify data, or disrupt operations. The issue was addressed in commit dffe050, which introduced proper redaction of sensitive information in all relevant outputs. No known exploits have been reported in the wild as of the publication date. Organizations using Core-Bot versions prior to this patch are at risk and should update promptly. The vulnerability highlights the importance of secure handling of environment variables and careful sanitization of logs and user-facing messages in software development.

Potential Impact

For European organizations, especially those operating healthcare-related Discord communities or using Core-Bot for server management, this vulnerability poses a significant risk. Exposure of API keys can lead to unauthorized access to backend databases, user data, or other integrated services, potentially resulting in data breaches, service disruptions, or unauthorized modifications. Given the bot's use in Maple Hospital servers, there is an elevated risk to sensitive health-related information or operational continuity. The compromise of API keys could also facilitate lateral movement within organizational networks or cloud environments, increasing the scope of impact. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting personal data, and such a leak could lead to compliance violations and financial penalties. The high CVSS score (8.8) reflects the critical nature of the threat, emphasizing the need for immediate remediation. Although no active exploits are known, the public disclosure of the vulnerability increases the risk of future attacks, particularly targeting organizations that delay patching. The impact extends beyond confidentiality to integrity and availability, as attackers could manipulate or disrupt services using the exposed credentials.

Mitigation Recommendations

1. Immediately update Core-Bot to the patched version including commit dffe050 or later to ensure proper redaction of sensitive information. 2. Conduct a thorough audit of existing logs, summaries, and webhook messages to identify and remove any previously leaked API keys or sensitive data. 3. Rotate all potentially exposed API keys (SUPABASE_API_KEY, TOKEN) to invalidate any compromised credentials. 4. Implement strict access controls on logs and monitoring systems to limit exposure of sensitive information to authorized personnel only. 5. Enhance development practices by enforcing environment variable handling policies that prevent direct logging or embedding of secrets. 6. Use automated scanning tools to detect accidental exposure of secrets in code, logs, or configuration files. 7. Educate developers and administrators on secure coding and operational practices related to secret management and error handling. 8. Monitor Discord server activities and webhook usage for unusual behavior that could indicate exploitation attempts. 9. Consider deploying runtime application self-protection (RASP) or similar technologies to detect and block unauthorized data disclosures in real time. 10. Establish incident response procedures specifically addressing potential credential leaks and their remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-18T16:14:56.693Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69264a57ca41832e1e4ac27f

Added to database: 11/26/2025, 12:31:19 AM

Last enriched: 12/3/2025, 4:24:19 AM

Last updated: 1/10/2026, 10:16:09 PM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats