Typebot is an open-source chatbot builder. In versions prior to 3.13.1, a Server-Side Request Forgery (SSRF) vulnerability in the Typebot webhook block (HTTP Request component) functionality allows authenticated users to make arbitrary HTTP requests from the server, including access to AWS Instance Metadata Service (IMDS). By bypassing IMDSv2 protection through custom header injection, attackers can extract temporary AWS IAM credentials for the EKS node role, leading to complete compromise of the Kubernetes cluster and associated AWS infrastructure. Version 3.13.1 fixes the issue.
History

Fri, 14 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Typebot
Typebot typebot
Vendors & Products Typebot
Typebot typebot

Thu, 13 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 19:45:00 +0000

Type Values Removed Values Added
Description Typebot is an open-source chatbot builder. In versions prior to 3.13.1, a Server-Side Request Forgery (SSRF) vulnerability in the Typebot webhook block (HTTP Request component) functionality allows authenticated users to make arbitrary HTTP requests from the server, including access to AWS Instance Metadata Service (IMDS). By bypassing IMDSv2 protection through custom header injection, attackers can extract temporary AWS IAM credentials for the EKS node role, leading to complete compromise of the Kubernetes cluster and associated AWS infrastructure. Version 3.13.1 fixes the issue.
Title Typebot May Expose AWS EKS Credentials via Server Side Request Forgery in Webhook Block
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-13T19:42:42.603Z

Updated: 2025-11-13T19:53:56.903Z

Reserved: 2025-11-10T14:07:42.921Z

Link: CVE-2025-64709

cve-icon Vulnrichment

Updated: 2025-11-13T19:53:53.202Z

cve-icon NVD

Status : Received

Published: 2025-11-13T20:15:53.053

Modified: 2025-11-13T20:15:53.053

Link: CVE-2025-64709

cve-icon Redhat

No data.