Typebot IDOR & XSS: Automating the Theft of Your Own API Keys
Vulnerability ID: CVE-2025-65098
CVSS Score: 7.4
Published: 2026-01-22
A critical chain of vulnerabilities in Typebot allows attackers to craft malicious bot templates that, when previewed by a victim, execute arbitrary JavaScript to harvest and exfiltrate all stored secrets (OpenAI keys, SMTP passwords, etc.) via a backend IDOR.
TL;DR
Typebot's "Execute on Client" feature allowed un-sandboxed JavaScript execution. Combined with a backend authorization flaw (IDOR) in the credentials.getCredentials endpoint, this allows anyone who can convince a Typebot admin to preview a malicious template to instantly steal every API key and secret stored in that Typebot instance.
⚠️ Exploit Status: POC
Technical Details
- Attack Vector: Network (N)
- Complexity: Low (L)
- Privileges Required: None (N) - Social Engineering
- User Interaction: Required (R) - Victim must preview/run bot
- CVSS v3.1: 7.4 (High)
- CWE ID: CWE-639 (Authorization Bypass)
- Exploit Status: PoC Available
Affected Systems
- Typebot Self-Hosted < 3.13.2
- Typebot Cloud (Patched)
-
Typebot: < 3.13.2 (Fixed in:
3.13.2)
Code Analysis
Commit: a68f0c9
fix: security sandbox for client-side scripts
const safeFetch = async (input, init) => { ... credentials: 'omit' ... }
Exploit Details
- GitHub Security Advisory: Advisory containing PoC and technical details
Mitigation Strategies
- Upgrade Typebot to version 3.13.2 or later immediately.
- Implement Content Security Policy (CSP) headers to restrict where the browser can send data (connect-src).
- Audit all imported Typebot templates for unknown 'Script' blocks.
Remediation Steps:
- Pull the latest Docker image:
docker pull baptistearno/typebot:latest - Restart your container fleet.
- Review the 'Credentials' section in your settings to ensure no unknown API keys have been created or accessed recently.
- Rotate any API keys (OpenAI, Google, Stripe) that were stored in Typebot prior to the patch.
References
Read the full report for CVE-2025-65098 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)