GHSA-9PQ4-5HCF-288C
Vulnerability from github – Published: 2026-02-19 15:18 – Updated: 2026-02-19 15:18
VLAI?
Summary
Cache poisoning in @sveltejs/adapter-vercel
Details
Versions of @sveltejs/adapter-vercel prior to 6.3.2 are vulnerable to cache poisoning. An internal query parameter intended for Incremental Static Regeneration (ISR) is accessible on all routes, allowing an attacker to cause sensitive user-specific responses to be cached and served to other users.
Successful exploitation requires a victim to visit an attacker-controlled link while authenticated.
Existing deployments are protected by Vercel's WAF, but users should upgrade as soon as possible.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "@sveltejs/adapter-vercel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.3.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-27118"
],
"database_specific": {
"cwe_ids": [
"CWE-346"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-19T15:18:02Z",
"nvd_published_at": null,
"severity": "MODERATE"
},
"details": "Versions of `@sveltejs/adapter-vercel` prior to 6.3.2 are vulnerable to cache poisoning. An internal query parameter intended for Incremental Static Regeneration (ISR) is accessible on all routes, allowing an attacker to cause sensitive user-specific responses to be cached and served to other users.\n\nSuccessful exploitation requires a victim to visit an attacker-controlled link while authenticated.\n\nExisting deployments are protected by Vercel\u0027s WAF, but users should upgrade as soon as possible.",
"id": "GHSA-9pq4-5hcf-288c",
"modified": "2026-02-19T15:18:02Z",
"published": "2026-02-19T15:18:02Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/sveltejs/kit/security/advisories/GHSA-9pq4-5hcf-288c"
},
{
"type": "PACKAGE",
"url": "https://github.com/sveltejs/kit"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Cache poisoning in @sveltejs/adapter-vercel"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…