关联漏洞
介绍
# CVE-2025-51862
## Vulnerability description
TelegAI, a web application for constructing and chatting with AI Characters, is vulnerable to Insecure Direct Object Reference (IDOR) in its chat component. An attacker can exploit this IDOR to tamper other users' conversation. Additionally, malicious contents and XSS payloads can be injected, leading to phishing attack, user spoofing and account hijacking via XSS.
## Attack Vectors
TelegAI is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability concerning how conversation API is handled. The API `https://ywqesktuqvgsmgraors.supabase.co/functions/v1/chat` primarily relies on `profile_id` field in the request for authorization , leading to an IDOR or broken access control vulnerability. The `profile_id` is disclosed in each shared conversation, which can be easily collect with social engineering. By exploiting this vulnerability, an attacker can arbitrarily tamper conversations shared by other users, which may result in phishing attack, user spoofing and account hijacking via XSS (XSS is another vulnerability(CVE-2025-51860)). Figure 1 shows the POC of this IDOR.

When change `profile_id`, the communication will be completed with victim's chat.
## Vulnerability affected
This vulnerability can have an impact on any user of https://telegai.com. The of user's chat credit will be abused.
文件快照
[4.0K] /data/pocs/491b58d1bfcc57acf902ee8daedf72c8973ff1f2
├── [218K] figure1.png
└── [1.4K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。