Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-51862 PoC — TelegAI 跨站脚本漏洞

Source
Associated Vulnerability
Title:TelegAI 跨站脚本漏洞 (CVE-2025-51862)
Description:TelegAI是TelegAI公司的一个AI聊天机器人网站。 TelegAI 2025-05-26及之前版本存在跨站脚本漏洞,该漏洞源于不安全的直接对象引用,可能导致篡改其他用户对话和注入恶意内容。
Readme
# CVE-2025-51862
## Vulnerability description

   TelegAI, a web application for constructing and chatting with AI Characters, is vulnerable to Insecure Direct Object Reference (IDOR) in its chat component. An attacker can exploit this IDOR to tamper other users' conversation. Additionally, malicious contents and XSS payloads can be injected, leading to phishing attack, user spoofing and account hijacking via XSS.

## Attack Vectors

   TelegAI is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability concerning how conversation API is handled. The API `https://ywqesktuqvgsmgraors.supabase.co/functions/v1/chat` primarily relies on `profile_id` field in the request for authorization , leading to an IDOR or broken access control vulnerability. The `profile_id` is disclosed in each shared conversation, which can be easily collect with social engineering. By exploiting this vulnerability, an attacker can arbitrarily tamper conversations shared by other users, which may result in phishing attack, user spoofing and account hijacking via XSS (XSS is another vulnerability(CVE-2025-51860)). Figure 1 shows the POC of this IDOR.

   ![Figure 1 IDOR](./figure1.png)

   When change `profile_id`, the communication will be completed with victim's chat.

## Vulnerability affected

   This vulnerability can have an impact on any user of https://telegai.com. The of user's chat credit will be abused.
File Snapshot

[4.0K] /data/pocs/491b58d1bfcc57acf902ee8daedf72c8973ff1f2 ├── [218K] figure1.png └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.