Description
TypeBot is a chatbot builder tool. In versions prior to 3.16.0, the Typebot viewer (packages/embeds/js) renders anchor tags from rich text bubble content without filtering the javascript: URI scheme. A bot author can set a link URL to javascript:PAYLOAD, which executes in the visitor's browser context when clicked. Since the viewer is typically embedded in a third-party site, the attacker's JavaScript runs in the host page's origin and can exfiltrate cookies and session tokens. This can result in any authenticated Typebot user (including those on the free tier) being able to create a bot with this payload. Shared bots are publicly accessible — no victim authentication is required. This issue has been resolved in version 3.16.0.
Published: 2026-05-22
Score: 5.4 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability allows a bot author to embed a link that uses the javascript: URI scheme within a rich text bubble. When a user clicks the link in the viewer, the browser executes the supplied JavaScript in the context of the host page, which can access and exfiltrate cookies or session tokens and leak user data. This constitutes a stored cross‑site scripting flaw that can compromise confidentiality and data integrity for anyone who views the affected bot.

Affected Systems

The flaw exists in Typebot.io (baptisteArno) versions earlier than 3.16.0. Any user of the platform who can create or edit bots—including free tier accounts—can embed the malicious link, and all visitors to a shared or public bot are potential victims.

Risk and Exploitability

The CVSS score of 5.4 indicates a moderate severity. The EPSS score is currently unavailable, which suggests the exploit likelihood is unknown, and the vulnerability is not listed in the CISA KEV catalog. Attackers must have the ability to build or modify a bot and need users to click the injected link on a page that embeds the Typebot viewer. Once triggered, the attacker’s script runs as if it originated from the host site, providing significant risk to data confidentiality for all visitors.

Generated by OpenCVE AI on May 22, 2026 at 19:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Typebot viewer to version 3.16.0 or later to eliminate the vulnerable link rendering
  • Ensure that any embedded Typebot instances on third‑party sites use the patched viewer and that the site itself validates or sanitizes link URLs before rendering
  • If immediate upgrade is not possible, remove the javascript: scheme from any user‑supplied URLs or block links that use this scheme to prevent script execution

Generated by OpenCVE AI on May 22, 2026 at 19:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 23 May 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 18:00:00 +0000

Type Values Removed Values Added
Description TypeBot is a chatbot builder tool. In versions prior to 3.16.0, the Typebot viewer (packages/embeds/js) renders anchor tags from rich text bubble content without filtering the javascript: URI scheme. A bot author can set a link URL to javascript:PAYLOAD, which executes in the visitor's browser context when clicked. Since the viewer is typically embedded in a third-party site, the attacker's JavaScript runs in the host page's origin and can exfiltrate cookies and session tokens. This can result in any authenticated Typebot user (including those on the free tier) being able to create a bot with this payload. Shared bots are publicly accessible — no victim authentication is required. This issue has been resolved in version 3.16.0.
Title TypeBot: Stored XSS via javascript: URI in text bubble links — bot author executes JS on visitors' browsers
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-23T02:34:09.886Z

Reserved: 2026-04-08T00:01:47.627Z

Link: CVE-2026-39964

cve-icon Vulnrichment

Updated: 2026-05-23T02:33:26.920Z

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T19:30:44Z

Weaknesses