CVE-2025-64709 PUBLISHED

Typebot May Expose AWS EKS Credentials via Server Side Request Forgery in Webhook Block

Assigner: GitHub_M
Reserved: 10.11.2025 Published: 13.11.2025 Updated: 13.11.2025

Typebot is an open-source chatbot builder. In versions prior to 3.13.1, a Server-Side Request Forgery (SSRF) vulnerability in the Typebot webhook block (HTTP Request component) functionality allows authenticated users to make arbitrary HTTP requests from the server, including access to AWS Instance Metadata Service (IMDS). By bypassing IMDSv2 protection through custom header injection, attackers can extract temporary AWS IAM credentials for the EKS node role, leading to complete compromise of the Kubernetes cluster and associated AWS infrastructure. Version 3.13.1 fixes the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
CVSS Score: 9.6

Product Status

Vendor baptisteArno
Product typebot.io
Versions
  • Version < 3.13.1 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE