CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Lifecycle Timeline
6DescriptionNVD
Hikka is a Telegram userbot. A vulnerability affects all users of versions below 1.6.2, including most of the forks. It allows an unauthenticated attacker to gain access to Telegram account of a victim, as well as full access to the server. The issue is patched in version 1.6.2. No known workarounds are available.
AnalysisAI
CVE-2025-52571 is a critical authentication bypass vulnerability in Hikka Telegram userbot affecting versions below 1.6.2 that allows unauthenticated attackers to gain unauthorized access to victims' Telegram accounts and full server control. The vulnerability has a CVSS score of 9.6 (Critical) with network-based exploitation requiring only user interaction; patch version 1.6.2 is available as the sole remediation with no known workarounds.
Technical ContextAI
Hikka is a Telegram userbot framework built on top of Telegram's client API (TDLib or similar). The vulnerability stems from improper authentication mechanisms (CWE-287: Improper Authentication), likely involving weak session validation, insecure token handling, or flawed authorization checks in the userbot's command processing or HTTP API interface. The affected technology stack involves Python-based Telegram client libraries and the bot's internal request handling mechanism. The vulnerability affects CPE entries for hikka userbot across multiple forks and derivatives that haven't implemented the patch. The root cause involves missing or bypassable authentication controls that should validate user permissions before executing privileged operations or accessing sensitive Telegram account data.
RemediationAI
- action: Immediate Upgrade; details: Update Hikka userbot to version 1.6.2 or later. This is the definitive patch addressing the authentication vulnerability.; steps: ['Stop the running Hikka instance', 'Execute: pip install --upgrade hikka>=1.6.2 (or equivalent for your installation method)', 'Restart the userbot service', 'Verify version: confirm installation shows v1.6.2+']
- action: Fork-Specific Updates; details: If using Hikka forks, check upstream repositories for 1.6.2 equivalent patches. Most forks should have backported the fix; verify via fork's changelog/releases.; links: Check individual fork repositories on GitHub for security advisories
- action: Credential Reset; details: Post-patching, reset Telegram account credentials and review active sessions to invalidate any potentially compromised tokens. Change associated API keys and webhooks.; steps: ['Log out all active Telegram sessions from Telegram Settings > Privacy and Security > Active Sessions', 'Review and revoke any exposed bot tokens or API credentials', 'Monitor Telegram account for suspicious activity']
- action: Server Hardening; details: Given server compromise risk, audit hosting infrastructure for unauthorized access, modified files, or persistence mechanisms.; steps: ['Review server access logs for unauthorized login attempts', 'Check file integrity (focus on userbot installation directories)', 'Scan for backdoors or persistence (cron jobs, modified systemd services)', 'Consider fresh deployment if compromise is suspected']
- action: Workarounds; details: NO KNOWN WORKAROUNDS. Patching is mandatory; there is no safe configuration bypass or mitigation short of disabling the userbot entirely.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-19067