Description
TypeBot is a chatbot builder tool. In versions 3.15.2 and prior, the fix for GHSA-4xc5-wfwc-jw47 ("Credential Theft via Client-Side Script Execution and API Authorization Bypass") is incomplete. While the builder's getCredentials tRPC endpoint was patched with workspace membership checks, the bot-engine runtime still allows any authenticated user to use credentials from any workspace via the preview chat endpoint. The bot-engine's getCredentials() utility function uses a falsy check (if (workspaceId && ...)) for workspace ownership validation. Since the preview endpoint accepts a client-controlled workspaceId field and the Zod schema allows empty strings, an attacker can supply workspaceId: "" to bypass credential ownership verification entirely. Exploitation can result in credential exfiltration, external service abuse, financial damage and a data breach.
Published: 2026-05-22
Score: 7.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in TypeBot’s bot‑engine preview chat endpoint. Although the builder’s getCredentials tRPC endpoint was patched to include workspace membership checks, the runtime logic still permits any authenticated user to retrieve credentials from any workspace. The bug stems from a flawed falsy check that accepts an empty workspace identifier; the endpoint accepts a client‑controlled workspaceId field, and the schema allows empty strings, so an attacker can submit workspaceId : "" to bypass all ownership verification. As a result, a malicious user can exfiltrate stored credentials, abuse external services that are authenticated with those credentials, and potentially cause financial loss and a data breach.

Affected Systems

Any installation of typebot.io TypeBot running version 3.15.2 or earlier is susceptible. The issue was fixed in release v3.16.0 and later.

Risk and Exploitability

The CVSS score of 7.1 classifies the flaw as high severity. Exploitation requires a valid authenticated session, and the attack can be carried out remotely via the preview endpoint, making it accessible to any account holder. EPSS information is currently unavailable, but the lack of inclusion in the CISA KEV catalog does not diminish the risk; the logic flaw is straightforward to exploit once the attack vector is understood. Even without a public exploit, the combination of credential exfiltration and downstream abuse presents a serious threat to affected organizations.

Generated by OpenCVE AI on May 22, 2026 at 19:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade TypeBot to version 3.16.0 or newer, which implements proper workspace ownership checks in the bot‑engine preview endpoint.
  • Restrict or disable the preview chat endpoint for non‑owner users, ensuring that only workspace owners can access sensitive credential data via preview modes.
  • Implement strict server‑side validation on the workspaceId parameter to reject empty strings and enforce that the value matches the authenticated user’s workspace.

Generated by OpenCVE AI on May 22, 2026 at 19:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 18:45:00 +0000

Type Values Removed Values Added
Description TypeBot is a chatbot builder tool. In versions 3.15.2 and prior, the fix for GHSA-4xc5-wfwc-jw47 ("Credential Theft via Client-Side Script Execution and API Authorization Bypass") is incomplete. While the builder's getCredentials tRPC endpoint was patched with workspace membership checks, the bot-engine runtime still allows any authenticated user to use credentials from any workspace via the preview chat endpoint. The bot-engine's getCredentials() utility function uses a falsy check (if (workspaceId && ...)) for workspace ownership validation. Since the preview endpoint accepts a client-controlled workspaceId field and the Zod schema allows empty strings, an attacker can supply workspaceId: "" to bypass credential ownership verification entirely. Exploitation can result in credential exfiltration, external service abuse, financial damage and a data breach.
Title TypeBot: Cross-Workspace Credential Theft via Bot-Engine Preview Endpoint
Weaknesses CWE-284
CWE-522
CWE-639
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-22T18:26:55.446Z

Reserved: 2026-04-08T00:01:47.627Z

Link: CVE-2026-39968

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T20:00:13Z

Weaknesses