Description
TypeBot is a chatbot builder tool. In versions 3.15.2 and prior, the bot engine's the findResult query does not filter results by typebotId, allowing an authenticated user to load result data (user answers, variable values) from a different typebot by supplying a foreign resultId to the startChat endpoint. Exploitation is constrained by CUID2's cryptographically random 24-character IDs (making brute-force infeasible), the requirement that rememberUser be enabled, and the need for matching variable names in the current typebot. If successfully exploited, an attacker can access the original user's previous answers, session variable values, and hasStarted flag, potentially exposing PII like names, emails, and phone numbers. This issue has been fixed in version 3.16.0.
Published: 2026-05-22
Score: 3.1 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Typebot.io, a chatbot builder, contains a flaw in its bot engine where the query that retrieves result data is not properly filtered by the typebotId. This oversight allows an authenticated user to request the data of another typebot by supplying a foreign resultId to the startChat endpoint, thereby accessing that bot's answers, variable values, and certain session flags. The vulnerability can expose personally identifying information such as names, emails and phone numbers from previous user sessions.

Affected Systems

The flaw affects all installations of Typebot.io version 3.15.2 and earlier. The affected vendor is baptisteArno:typebot.io. To reach the impacted code, the attacker must use the startChat API endpoint on a logged‑in account. Upgrading to the released version 3.16.0 removes the missing filter and protects the data.

Risk and Exploitability

The CVSS score of 3.1 reflects a low severity due to the authentication requirement. Because the exploit depends on a cryptographically random 24‑character CUID2 token and the requirement for matching variable names, brute‑force attempts are infeasible, and the opportunity window is narrow. Although the EPSS score is currently unavailable, the vulnerability is not listed in CISA’s KEV catalog, suggesting no widespread exploitation has been reported yet. Nonetheless, if an authenticated user can target another bot, they could read PII and session state, presenting a data confidentiality risk.

Generated by OpenCVE AI on May 22, 2026 at 20:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Typebot.io v3.16.0 or later to apply the fix that adds the typebotId filter to the findResult query.
  • Validate the typebotId against the authenticated user's permissions before processing findResult queries to enforce access control.
  • Disable or restrict the rememberUser feature for accounts where cross‑bot data exposure is a concern, or enforce strict session isolation so that variable names must align with the current bot context.

Generated by OpenCVE AI on May 22, 2026 at 20:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 19:15:00 +0000

Type Values Removed Values Added
Description TypeBot is a chatbot builder tool. In versions 3.15.2 and prior, the bot engine's the findResult query does not filter results by typebotId, allowing an authenticated user to load result data (user answers, variable values) from a different typebot by supplying a foreign resultId to the startChat endpoint. Exploitation is constrained by CUID2's cryptographically random 24-character IDs (making brute-force infeasible), the requirement that rememberUser be enabled, and the need for matching variable names in the current typebot. If successfully exploited, an attacker can access the original user's previous answers, session variable values, and hasStarted flag, potentially exposing PII like names, emails, and phone numbers. This issue has been fixed in version 3.16.0.
Title TypeBot: Cross-Typebot Result Data Access via Missing typebotId Filter
Weaknesses CWE-639
CWE-862
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-22T18:36:23.724Z

Reserved: 2026-04-08T00:01:47.627Z

Link: CVE-2026-39967

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T20:30:06Z

Weaknesses