We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47948

Cocotais Bot has builtin .echo command injection



Description

Cocotais Bot is a QQ official robot framework based on qq-bot-sdk. Starting in version 1.5.0-test2-hotfix and prior to version 1.6.2, command echoing feature in the framework allows users to indirectly trigger privileged behavior by injecting special platform tags. Specifically, an unauthorized user can use the `/echo <qqbot-at-everyone />` command to cause the bot to send a message that mentions all members in the chat, bypassing any permission controls. This can lead to spam, disruption, or abuse of notification systems. Version 1.6.2 contains a patch for the issue.

Reserved 2025-05-14 | Published 2025-05-17 | Updated 2025-05-19 | Assigner GitHub_M


HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L

Problem types

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Product status

>= 1.5.0-test2-hotfix, < 1.6.2
affected

References

github.com/...is-bot/security/advisories/GHSA-mj2c-8hxf-ffvq

github.com/...ommit/d1cf01a9a41b3131241d1833444b890c8d6e70b8

cve.org (CVE-2025-47948)

nvd.nist.gov (CVE-2025-47948)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47948

Support options

Helpdesk Chat, Email, Knowledgebase