๐Ÿ” CVE Alert

CVE-2026-4984

HIGH 8.2

Botpress - Credential Disclosure via Twilio Webhook Handler

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th

The Twilio integration webhook handler accepts any POST request without validating Twilio's 'X-Twilio-Signature'. When processing media messages, it fetches user-controlled URLs ('MediaUrlN' parameters) using HTTP requests that include the integration's Twilio credentials in the 'Authorization' header. An attacker can forge a webhook payload pointing to their own server and receive the victim's 'accountSID' and 'authToken' in plaintext (base64-encoded Basic Auth), leading to full compromise of the Twilio account.

Vendor botpress
Product botpress
Published Mar 27, 2026
Last Updated Mar 27, 2026
Stay Ahead of the Next One

Get instant alerts for botpress botpress

Be the first to know when new high vulnerabilities affecting botpress botpress are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

botpress / botpress
0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
tenable.com: https://www.tenable.com/security/research/tra-2026-22