Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4xc5-wfwc-jw47 | Typebot affected by Credential Theft via Client-Side Script Execution and API Authorization Bypass |
Fri, 30 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:typebot:typebot:*:*:*:*:*:-:*:* |
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Typebot
Typebot typebot |
|
| Vendors & Products |
Typebot
Typebot typebot |
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Typebot is an open-source chatbot builder. In versions prior to 3.13.2, client-side script execution in Typebot allows stealing all stored credentials from any user. When a victim previews a malicious typebot by clicking "Run", JavaScript executes in their browser and exfiltrates their OpenAI keys, Google Sheets tokens, and SMTP passwords. The `/api/trpc/credentials.getCredentials` endpoint returns plaintext API keys without verifying credential ownership. Version 3.13.2 fixes the issue. | |
| Title | Typebot Vulnerable to Credential Theft via Client-Side Script Execution and API Authorization Bypass | |
| Weaknesses | CWE-200 CWE-284 CWE-311 CWE-522 CWE-639 CWE-79 CWE-862 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-22T16:25:45.772Z
Reserved: 2025-11-17T20:55:34.692Z
Link: CVE-2025-65098
Updated: 2026-01-22T16:25:37.363Z
Status : Analyzed
Published: 2026-01-22T15:16:48.370
Modified: 2026-01-30T14:32:00.327
Link: CVE-2025-65098
No data.
OpenCVE Enrichment
Updated: 2026-01-23T16:32:29Z
Github GHSA