We found results for “”
CVE-2025-65098
Good to know:
Date: January 22, 2026
Typebot is an open-source chatbot builder. In versions prior to 3.13.2, client-side script execution in Typebot allows stealing all stored credentials from any user. When a victim previews a malicious typebot by clicking "Run", JavaScript executes in their browser and exfiltrates their OpenAI keys, Google Sheets tokens, and SMTP passwords. The "/api/trpc/credentials.getCredentials" endpoint returns plaintext API keys without verifying credential ownership. Version 3.13.2 fixes the issue.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79Improper Access Control
CWE-284Exposure of Sensitive Information to an Unauthorized Actor
CWE-200Insufficiently Protected Credentials
CWE-522Missing Encryption of Sensitive Data
CWE-311Missing Authorization
CWE-862Authorization Bypass Through User-Controlled Key
CWE-639Top Fix
Upgrade Version
Upgrade to version @typebot.io/js - 0.9.15;https://github.com/baptisteArno/typebot.io.git - v3.13.2;https://github.com/baptisteArno/typebot.io.git - js-v0.9.15;https://github.com/baptisteArno/typebot.io.git - react-v0.9.15
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | CHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


