Server-Side Request Forgery Vulnerability in Typebot by Baptiste Arno
CVE-2026-33712

10CRITICAL

Key Information:

Vendor
CVE Published:
22 May 2026

What is CVE-2026-33712?

Typebot, a versatile chatbot builder, is vulnerable to Server-Side Request Forgery (SSRF) affecting versions 3.15.2 and earlier. This vulnerability allows unauthenticated users to exploit the preview chat endpoint, /api/v1/typebots/{typebotId}/preview/startChat, by submitting a crafted typebot definition containing server-side code blocks. The fetch function within the isolated-vm sandbox invokes Node.js native fetch without validating the HTTP request URL, effectively bypassing existing SSRF protections. If exploited, this vulnerability can lead to severe consequences, including the theft of cloud credentials, unauthorized access to internal networks, and potential data exfiltration for self-hosted Typebot instances and hosted services. Users are advised to upgrade to version 3.16.0, where the issue has been resolved.

Affected Version(s)

typebot.io < 3.16.0

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.