Home

Description

TypeBot is a chatbot builder tool. In versions prior to 3.16.0, SSRF protection for Webhook / HTTP Request blocks validates only the URL string, blocked hostname literals, and literal IP formats. It does not resolve DNS before allowing the request. As a result, a hostname such as ssrf-repro.example that resolves to 127.0.0.1, 169.254.169.254, or RFC1918/private space passes validation and is later fetched by the backend HTTP client. This enables server-side request forgery to loopback, cloud metadata, and private network targets. This issue has been resolved in version 3.16.0.

PUBLISHED Reserved 2026-03-26 | Published 2026-05-22 | Updated 2026-05-22 | Assigner GitHub_M




HIGH: 7.6CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

Problem types

CWE-20: Improper Input Validation

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 3.16.0
affected

References

github.com/...bot.io/security/advisories/GHSA-grcc-6x37-wwgp exploit

github.com/...bot.io/security/advisories/GHSA-grcc-6x37-wwgp

github.com/...ommit/23818bb0e54db23c456ee3fa6b12d82b2af848b8

github.com/baptisteArno/typebot.io/releases/tag/v3.16.0

cve.org (CVE-2026-34207)

nvd.nist.gov (CVE-2026-34207)

Download JSON