CVE-2026-39969 PUBLISHED

TypeBot: WhatsApp Webhook Endpoint Missing Signature Verification

Assigner: GitHub_M
Reserved: 08.04.2026 Published: 22.05.2026 Updated: 23.05.2026

TypeBot is a chatbot builder tool. In versions 3.16.0 and prior, the WhatsApp Cloud API webhook endpoint (POST /v1/workspaces/{workspaceId}/whatsapp/{credentialsId}/webhook) does not verify the x-hub-signature-256 HMAC signature included by Meta in every webhook delivery. The webhook URL exposes both workspaceId and credentialsId as path parameters, which are logged in web server access logs, visible in Meta's webhook configuration dashboard, and potentially shared when configuring integrations. This allows any unauthenticated attacker to send spoofed webhook messages to trigger bot flows, consume API resources, and interact with external services using the workspace owner's credentials. The issue has been fixed in version 3.17.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS Score: 6.5

Product Status

Vendor baptisteArno
Product typebot.io
Versions
  • Version < 3.17.0 is affected

References

Problem Types

  • CWE-287: Improper Authentication CWE
  • CWE-345: Insufficient Verification of Data Authenticity CWE