CVE-2025-64709

9.6 CRITICAL

📋 TL;DR

This SSRF vulnerability in Typebot allows authenticated users to make arbitrary HTTP requests from the server, including accessing AWS Instance Metadata Service. By bypassing IMDSv2 protections, attackers can extract AWS IAM credentials and compromise Kubernetes clusters and AWS infrastructure. All Typebot instances running versions before 3.13.1 with webhook functionality are affected.

💻 Affected Systems

Products:
  • Typebot
Versions: All versions prior to 3.13.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires webhook block functionality and authenticated user access. AWS EKS deployments are particularly vulnerable due to IMDS access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Kubernetes cluster and associated AWS infrastructure through stolen IAM credentials, leading to data exfiltration, resource hijacking, and lateral movement across cloud environments.

🟠

Likely Case

Extraction of AWS IAM credentials from EKS node roles, enabling unauthorized access to cloud resources and potential data breaches.

🟢

If Mitigated

Limited to internal network reconnaissance if proper network segmentation and IMDS protections are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. IMDSv2 bypass through header injection makes exploitation effective.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.13.1

Vendor Advisory: https://github.com/baptisteArno/typebot.io/security/advisories/GHSA-8gq9-rw7v-3jpr

Restart Required: Yes

Instructions:

1. Update Typebot to version 3.13.1 or later. 2. Restart the Typebot service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable webhook functionality

all

Temporarily disable the HTTP Request webhook block feature until patching is possible.

Restrict IMDS access

linux

Configure AWS security groups and network ACLs to block IMDS access from Typebot instances.

aws ec2 modify-instance-metadata-options --instance-id <instance-id> --http-tokens required --http-endpoint disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Typebot instances from AWS metadata services
  • Enforce least privilege IAM roles and regularly rotate credentials

🔍 How to Verify

Check if Vulnerable:

Check Typebot version via admin interface or deployment configuration. Versions below 3.13.1 are vulnerable.

Check Version:

Check Typebot admin dashboard or deployment manifest for version information.

Verify Fix Applied:

Confirm Typebot version is 3.13.1 or higher and test webhook functionality with restricted URLs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests from Typebot server to internal/metadata endpoints
  • Multiple failed webhook attempts to restricted URLs

Network Indicators:

  • Outbound connections from Typebot to AWS metadata service (169.254.169.254)
  • HTTP requests with custom headers to internal endpoints

SIEM Query:

source="typebot" AND (dest_ip="169.254.169.254" OR url="*metadata*" OR user_agent="*Typebot*")

🔗 References

📤 Share & Export