Hikka CVE-2025-52571

| EUVD-2025-19067 CRITICAL
Improper Authentication (CWE-287)
2025-06-24 [email protected]
9.6
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

6
Analysis Updated
Apr 16, 2026 - 05:53 EUVD-patch-fix
executive_summary
Re-analysis Queued
Apr 16, 2026 - 05:29 backfill_euvd_patch
patch_released
Patch available
Apr 16, 2026 - 05:29 EUVD
1.6.2
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-19067
CVE Published
Jun 24, 2025 - 20:15 nvd
CRITICAL 9.6

DescriptionNVD

Hikka is a Telegram userbot. A vulnerability affects all users of versions below 1.6.2, including most of the forks. It allows an unauthenticated attacker to gain access to Telegram account of a victim, as well as full access to the server. The issue is patched in version 1.6.2. No known workarounds are available.

AnalysisAI

CVE-2025-52571 is a critical authentication bypass vulnerability in Hikka Telegram userbot affecting versions below 1.6.2 that allows unauthenticated attackers to gain unauthorized access to victims' Telegram accounts and full server control. The vulnerability has a CVSS score of 9.6 (Critical) with network-based exploitation requiring only user interaction; patch version 1.6.2 is available as the sole remediation with no known workarounds.

Technical ContextAI

Hikka is a Telegram userbot framework built on top of Telegram's client API (TDLib or similar). The vulnerability stems from improper authentication mechanisms (CWE-287: Improper Authentication), likely involving weak session validation, insecure token handling, or flawed authorization checks in the userbot's command processing or HTTP API interface. The affected technology stack involves Python-based Telegram client libraries and the bot's internal request handling mechanism. The vulnerability affects CPE entries for hikka userbot across multiple forks and derivatives that haven't implemented the patch. The root cause involves missing or bypassable authentication controls that should validate user permissions before executing privileged operations or accessing sensitive Telegram account data.

RemediationAI

  • action: Immediate Upgrade; details: Update Hikka userbot to version 1.6.2 or later. This is the definitive patch addressing the authentication vulnerability.; steps: ['Stop the running Hikka instance', 'Execute: pip install --upgrade hikka>=1.6.2 (or equivalent for your installation method)', 'Restart the userbot service', 'Verify version: confirm installation shows v1.6.2+']
  • action: Fork-Specific Updates; details: If using Hikka forks, check upstream repositories for 1.6.2 equivalent patches. Most forks should have backported the fix; verify via fork's changelog/releases.; links: Check individual fork repositories on GitHub for security advisories
  • action: Credential Reset; details: Post-patching, reset Telegram account credentials and review active sessions to invalidate any potentially compromised tokens. Change associated API keys and webhooks.; steps: ['Log out all active Telegram sessions from Telegram Settings > Privacy and Security > Active Sessions', 'Review and revoke any exposed bot tokens or API credentials', 'Monitor Telegram account for suspicious activity']
  • action: Server Hardening; details: Given server compromise risk, audit hosting infrastructure for unauthorized access, modified files, or persistence mechanisms.; steps: ['Review server access logs for unauthorized login attempts', 'Check file integrity (focus on userbot installation directories)', 'Scan for backdoors or persistence (cron jobs, modified systemd services)', 'Consider fresh deployment if compromise is suspected']
  • action: Workarounds; details: NO KNOWN WORKAROUNDS. Patching is mandatory; there is no safe configuration bypass or mitigation short of disabling the userbot entirely.

Share

CVE-2025-52571 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy