CVE-2025-65957

N/A Unknown

📋 TL;DR

This vulnerability in Core Bot, an open-source Discord bot for Maple Hospital servers, allows sensitive API keys (SUPABASE_API_KEY, TOKEN) to be inadvertently leaked in error handling, summaries, or webhooks. The issue occurs when configuration summaries fail to properly redact sensitive data in embeds or logs. Anyone running affected versions of Core Bot is potentially impacted.

💻 Affected Systems

Products:
  • Core Bot
Versions: All versions prior to commit dffe050
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any deployment where error handling, summaries, or webhooks might trigger configuration logging.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to SUPABASE_API_KEY and TOKEN, allowing them to compromise the bot's functionality, access associated databases/services, and potentially take over Discord servers or steal sensitive data.

🟠

Likely Case

Sensitive API keys are exposed in logs or Discord embeds, leading to unauthorized access to bot-controlled resources and potential service disruption.

🟢

If Mitigated

With proper access controls and monitoring, exposure is limited to internal logs, but keys could still be compromised if logs are accessed by unauthorized parties.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires triggering error conditions or accessing logs/embeds where sensitive data might be exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit dffe050 and later

Vendor Advisory: https://github.com/Intercore-Productions/Core-Bot/security/advisories/GHSA-42j6-x28v-38r8

Restart Required: Yes

Instructions:

1. Update to commit dffe050 or later. 2. Pull latest changes from GitHub repository. 3. Restart the bot service. 4. Rotate all exposed API keys (SUPABASE_API_KEY, TOKEN) as precaution.

🔧 Temporary Workarounds

Disable detailed error logging

all

Configure the bot to log minimal error details to prevent sensitive data exposure.

Modify logging configuration to set log level to WARNING or ERROR only

Manual key redaction

all

Review and modify code to ensure API keys are properly redacted in all logging and embed generation.

Manually inspect error handling, summary, and webhook code for key exposure

🧯 If You Can't Patch

  • Rotate all API keys (SUPABASE_API_KEY, TOKEN) immediately to invalidate any potentially exposed credentials.
  • Implement strict access controls on logs and monitoring systems to prevent unauthorized access to sensitive data.

🔍 How to Verify

Check if Vulnerable:

Check if your Core Bot version is prior to commit dffe050 by examining git history or version metadata.

Check Version:

git log --oneline | head -5

Verify Fix Applied:

Verify that commit dffe050 is included in your current version and test error conditions to ensure no API keys appear in logs or embeds.

📡 Detection & Monitoring

Log Indicators:

  • Log entries containing SUPABASE_API_KEY=, TOKEN=, or other API key patterns in clear text

Network Indicators:

  • Unusual API calls to Supabase or Discord using potentially leaked keys

SIEM Query:

source="core-bot-logs" AND ("SUPABASE_API_KEY" OR "TOKEN" OR "api_key")

🔗 References

📤 Share & Export