Vulnerability Description
A vulnerability was found in vercel ai up to 3.0.97. The affected element is the function validateDownloadUrl of the file packages/provider-utils/src/download-blob.ts of the component provider-utils. The manipulation results in server-side request forgery. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vercel | Ai | <= 3.0.97 |
Related Weaknesses (CWE)
References
- https://gist.github.com/YLChen-007/07d149bd68adbee58165b4207a2abc71Not Applicable
- https://gist.github.com/YLChen-007/cf7e47e4dda392f474ca77a66d1d847fExploitThird Party Advisory
- https://vuldb.com/submit/811404Third Party AdvisoryVDB Entry
- https://vuldb.com/submit/811405Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364393Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364393/ctiPermissions RequiredVDB Entry
FAQ
What is CVE-2026-8768?
CVE-2026-8768 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in vercel ai up to 3.0.97. The affected element is the function validateDownloadUrl of the file packages/provider-utils/src/download-blob.ts of the component provider-utils. ...
How severe is CVE-2026-8768?
CVE-2026-8768 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8768?
Check the references section above for vendor advisories and patch information. Affected products include: Vercel Ai.