Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2026-39968— TypeBot: Cross-Workspace Credential Theft via Bot-Engine Preview Endpoint

CVSS 7.1 · High EPSS 0.04% · P11

Possible ATT&CK Techniques 1AI

T1190 · Exploit Public-Facing Application

Affected Version Matrix 1

VendorProductVersion RangeStatus
baptisteArnotypebot.io< 3.16.0affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-39968

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
TypeBot: Cross-Workspace Credential Theft via Bot-Engine Preview Endpoint
Source: NVD (National Vulnerability Database)
Vulnerability Description
TypeBot is a chatbot builder tool. In versions 3.15.2 and prior, the fix for GHSA-4xc5-wfwc-jw47 ("Credential Theft via Client-Side Script Execution and API Authorization Bypass") is incomplete. While the builder's getCredentials tRPC endpoint was patched with workspace membership checks, the bot-engine runtime still allows any authenticated user to use credentials from any workspace via the preview chat endpoint. The bot-engine's getCredentials() utility function uses a falsy check (if (workspaceId && ...)) for workspace ownership validation. Since the preview endpoint accepts a client-controlled workspaceId field and the Zod schema allows empty strings, an attacker can supply workspaceId: "" to bypass credential ownership verification entirely. Exploitation can result in credential exfiltration, external service abuse, financial damage and a data breach.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
访问控制不恰当
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
baptisteArnotypebot.io < 3.16.0 -

II. Public POCs for CVE-2026-39968

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-39968

登录查看更多情报信息。

Patches & Fixes for CVE-2026-39968 (1)

Vendor Advisories for CVE-2026-39968 (1)

Vendor Pages for CVE-2026-39968 (1)

Same Patch Batch · baptisteArno · 2026-05-22 · 11 CVEs total

CVE-2026-3371210.0 CRITICALTypeBot: Unauthenticated SSRF via isolated-vm fetch in preview chat endpoint bypasses SSRF
CVE-2026-284458.7 HIGHTypebot: Stored XSS via Rating Block Custom Icon Bypasses isUnsafe Sandbox in Builder Prev
CVE-2026-399657.7 HIGHTypeBot: SSRF via Open Redirect Bypass in HTTP Request and Code Blocks
CVE-2026-342077.6 HIGHTypeBot: SSRF Protection Bypass via DNS-Resolved Hostnames in Webhook / HTTP Request Valid
CVE-2026-284446.5 MEDIUMTypebot: IDOR in Result Logs Endpoint Allows Cross-Workspace Data Disclosure
CVE-2026-399666.5 MEDIUMTypeBot: Async filter() bypasses authorization, allowing IDOR in getLinkedTypebots and lea
CVE-2026-399696.5 MEDIUMTypeBot: WhatsApp Webhook Endpoint Missing Signature Verification
CVE-2026-399645.4 MEDIUMTypeBot: Stored XSS via javascript: URI in text bubble links — bot author executes JS on v
CVE-2026-399673.1 LOWTypeBot: Cross-Typebot Result Data Access via Missing typebotId Filter
CVE-2026-39970TypeBot: Stored Cross-Site Scripting (XSS) via SVG File Upload On Profile Picture Form

IV. Related Vulnerabilities

V. Comments for CVE-2026-39968

No comments yet


Leave a comment