CVE-2025-47948 – cocotais-bot
Package
Manager: npm
Name: cocotais-bot
Vulnerable Version: >=1.5.0-test2-hotfix <1.6.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00065 pctl0.20557
Details
Cocotais Bot has builtin .echo command injection ### Summary A command echoing feature in the framework allows users to indirectly trigger privileged behavior by injecting special platform tags. Specifically, an unauthorized user can use the `/echo <qqbot-at-everyone />` command to cause the bot to send a message that mentions all members in the chat, bypassing any permission controls. This can lead to spam, disruption, or abuse of notification systems. ### Details The framework provides a command `/echo` that causes the bot to repeat any user-provided message verbatim in the group chat. However, the bot fails to sanitize or filter platform-specific control elements such as `<qqbot-at-everyone />`, which, when included in a message, mentions everyone (i.e., @全体成员). While normal users are forbidden from using this tag in normal chats, the bot, which has higher privileges, is allowed to do so. Since the `/echo` command blindly echoes any content, a user can exploit this by sending: ``` /echo <qqbot-at-everyone /> ``` The bot will then send a message containing `<qqbot-at-everyone />`, causing the platform to interpret it as an @全体成员 command, effectively allowing an unauthorized user to @everyone via the bot. ### PoC 1. Set up a chatbot using the affected framework. 2. Join the chat that includes the bot as a regular user with **no permission to use @全体成员**. 3. Send the following message in the chat: ``` /echo <qqbot-at-everyone /> ``` 4. The bot will respond by repeating the message, and the platform will interpret `<qqbot-at-everyone />` as an @全体成员 mention. 5. All the chat members receive a notification, despite the user lacking that permission.
Metadata
Created: 2025-05-19T16:25:05Z
Modified: 2025-05-19T16:25:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-mj2c-8hxf-ffvq/GHSA-mj2c-8hxf-ffvq.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-mj2c-8hxf-ffvq
Finding: F404
Auto approve: 1