Impact
The vulnerability is the absence of verification for the x‑hub‑signature‑256 header on the WhatsApp Cloud API webhook endpoint in TypeBot version 3.16.0 and earlier. Because the signature is not checked, an attacker can forge webhook requests to POST /v1/workspaces/{workspaceId}/whatsapp/{credentialsId}/webhook. The forged payload triggers bot flows and causes the bot to perform actions using the workspace’s WhatsApp credentials, enabling the attacker to consume API resources or interact with other services as the legitimate owner.
Affected Systems
TypeBot is provided by baptisteArno under the package typebot.io. The webhook endpoint vulnerability applies to all versions 3.16.0 and earlier. The issue was fixed in release 3.17.0.
Risk and Exploitability
With a CVSS score of 6.5 this vulnerability is classified as medium severity. The EPSS score is not available, but the flaw can be exploited without authentication by sending a crafted HTTP POST to the exposed endpoint, so the practical risk remains high for installations that expose the webhook URL to the public internet. The vulnerability is not listed in CISA's KEV catalogue.
OpenCVE Enrichment