Vulnerability Description
Typebot is an open-source chatbot builder. In versions prior to 3.13.2, client-side script execution in Typebot allows stealing all stored credentials from any user. When a victim previews a malicious typebot by clicking "Run", JavaScript executes in their browser and exfiltrates their OpenAI keys, Google Sheets tokens, and SMTP passwords. The `/api/trpc/credentials.getCredentials` endpoint returns plaintext API keys without verifying credential ownership. Version 3.13.2 fixes the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typebot | Typebot | < 3.13.2 |
Related Weaknesses (CWE)
References
- https://github.com/baptisteArno/typebot.io/security/advisories/GHSA-4xc5-wfwc-jwExploitVendor Advisory
- https://github.com/baptisteArno/typebot.io/security/advisories/GHSA-4xc5-wfwc-jwExploitVendor Advisory
FAQ
What is CVE-2025-65098?
CVE-2025-65098 is a vulnerability with a CVSS score of 7.4 (HIGH). Typebot is an open-source chatbot builder. In versions prior to 3.13.2, client-side script execution in Typebot allows stealing all stored credentials from any user. When a victim previews a malicious...
How severe is CVE-2025-65098?
CVE-2025-65098 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65098?
Check the references section above for vendor advisories and patch information. Affected products include: Typebot Typebot.