Cyber Posture

CVE-2025-26604

High

Published: 18 February 2025

Published
18 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.3 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:H
EPSS Score 0.0011 29.5th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.

Security Summary

CVE-2025-26604 is a vulnerability in Discord-Bot-Framework-Kernel, a Discord bot framework built with interactions.py that supports modular extension management and secure execution. The issue stems from the framework's support for arbitrary user-submitted code execution, enabling the execution of potentially malicious code that can cause damage or extract sensitive information, such as the bot token. It affects any Discord user hosting Discord-Bot-Framework-Kernel prior to commit f0d9e70841a0e3170b88c4f8d562018ccd8e8b14. The vulnerability is rated 8.3 (High) under CVSS 3.1 (AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:H) and is associated with CWE-200 (Exposure of Sensitive Information).

Attackers with high privileges can exploit this by loading a malicious module and executing a command to extract the bot token. With the token, they can deploy a blocking module to sabotage the bot via a DDoS-style attack, while using the stolen token to operate a fake bot that impersonates the legitimate one. If the bot holds high privileges on the Discord server, attackers gain effectively full control until the bot is kicked.

Advisories recommend upgrading to commit f0d9e70841a0e3170b88c4f8d562018ccd8e8b14 or later. For those unable to upgrade, limiting the Discord bot's access through configuration options may reduce risk. Relevant details are available in the GitHub commit and security advisory.

Details

CWE(s)
CWE-200

MITRE ATT&CK Enterprise Techniques

T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Vulnerability enables arbitrary Python code execution via malicious module loading to extract sensitive information such as the bot token.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References