Vulnerability Description
Typebot is an open-source chatbot builder. In versions prior to 3.13.1, a Server-Side Request Forgery (SSRF) vulnerability in the Typebot webhook block (HTTP Request component) functionality allows authenticated users to make arbitrary HTTP requests from the server, including access to AWS Instance Metadata Service (IMDS). By bypassing IMDSv2 protection through custom header injection, attackers can extract temporary AWS IAM credentials for the EKS node role, leading to complete compromise of the Kubernetes cluster and associated AWS infrastructure. Version 3.13.1 fixes the issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typebot | Typebot | < 3.13.1 |
Related Weaknesses (CWE)
References
- https://github.com/baptisteArno/typebot.io/security/advisories/GHSA-8gq9-rw7v-3jExploitMitigationVendor Advisory
FAQ
What is CVE-2025-64709?
CVE-2025-64709 is a vulnerability with a CVSS score of 9.6 (CRITICAL). Typebot is an open-source chatbot builder. In versions prior to 3.13.1, a Server-Side Request Forgery (SSRF) vulnerability in the Typebot webhook block (HTTP Request component) functionality allows au...
How severe is CVE-2025-64709?
CVE-2025-64709 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-64709?
Check the references section above for vendor advisories and patch information. Affected products include: Typebot Typebot.