Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Affecting cocotais-bot package, versions >=1.5.0-test2-hotfix <1.6.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-COCOTAISBOT-10185779
  • published20 May 2025
  • disclosed17 May 2025
  • creditUnknown

Introduced: 17 May 2025

NewCVE-2025-47948  (opens in a new tab)
CWE-74  (opens in a new tab)

How to fix?

Upgrade cocotais-bot to version 1.6.2 or higher.

Overview

cocotais-bot is a 基于 qq-bot-sdk 实现的的QQ官方机器人框架

Affected versions of this package are vulnerable to Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') through the command echoing feature. An attacker can trigger privileged behavior and bypass permission controls by injecting special platform tags.

PoC

  1. Set up a chatbot using the affected framework.
  2. Join the chat that includes the bot as a regular user with no permission to use @everyone.
  3. Send the following message in the chat:

 /echo

The bot will respond by repeating the message, and the platform will interpret as an @everyone mention. All the chat members receive a notification, despite the user lacking that permission.

References

CVSS Base Scores

version 4.0
version 3.1