EUVD-2025-19066

| CVE-2025-52572 CRITICAL
2025-06-24 [email protected]
10.0
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-19066
CVE Published
Jun 24, 2025 - 21:15 nvd
CRITICAL 10.0

DescriptionNVD

Hikka, a Telegram userbot, has vulnerability affects all users on all versions of Hikka. Two scenarios are possible. 1. Web interface does not have an authenticated session: attacker can use his own Telegram account to gain RCE to the server by authorizing in the dangling web interface. 2. Web interface does have an authenticated session: due to insufficient warning in the authentication message, users were tempted to click "Allow" in the "Allow web application ops" menu. This gave an attacker access not only to remote code execution, but also to Telegram accounts of owners. Scenario number 2 is known to have been exploited in the wild. No known patches are available, but some workarounds are available. Use --no-web flag and do not start userbot without it; after authorizing in the web interface, close the port on the server and/or start the userbot with --no-web flag; and do not click "Allow" in your helper bot unless it is your explicit action that needs to be allowed.

AnalysisAI

CVE-2025-52572 is a critical remote code execution vulnerability in Hikka, a Telegram userbot, affecting all versions across all platforms. The vulnerability exists in two exploitation paths: an unauthenticated web interface allowing direct RCE via attacker-controlled Telegram accounts, and an authenticated interface where insufficient UI warnings trick users into granting dangerous permissions, enabling both RCE and Telegram account compromise. Scenario 2 has been actively exploited in the wild, with a CVSS 10.0 score reflecting network-accessible unauthenticated attack paths and complete system compromise potential.

Technical ContextAI

Hikka is a Telegram userbot framework that includes a web interface component for remote management and automation. The vulnerability stems from CWE-287 (Improper Authentication) in two distinct contexts: (1) insufficient or missing authentication checks on the web interface endpoints, allowing any network-adjacent attacker with a Telegram account to authorize and execute arbitrary code on the host system, and (2) inadequate user warnings and consent mechanisms in the OAuth-like permission grant flow ('Allow web application ops'), which social engineers users into authorizing sensitive operations. The root cause is a combination of weak access controls on the web management interface and insufficient friction in the privilege escalation consent process. The web interface likely exposes dangerous operations (code execution, file access, Telegram API token usage) without proper authentication or explicit user confirmation.

RemediationAI

Immediate mitigation (no patches available): (1) Disable web interface entirely: start Hikka with --no-web flag as a permanent configuration to eliminate both unauthenticated and authenticated attack surfaces, (2) Network isolation: firewall the web interface port (typically localhost-only or block externally), restrict access to trusted IPs only, (3) Revoke dangerous permissions: if users have previously clicked 'Allow' in the helper bot's 'Allow web application ops' menu, remove that authorization via Telegram bot settings and do not re-grant it unless actively needed, (4) Account hygiene: rotate Telegram session tokens and review connected applications in Telegram client settings. Long-term: monitor the Hikka GitHub repository (https://github.com/hikarirepo/Hikka) for security patches or version updates that address CWE-287 authentication deficiencies. As of now, no patched versions exist; users must rely entirely on workarounds.

Share

EUVD-2025-19066 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy