Impact
A vulnerability exists in Vercel AI before version 3.0.97 in the run step of the .github/workflows/prettier‑on‑automerge.yml file. Malicious input to the PR Branch Name Interpolation component can be used to inject arbitrary operating‑system commands. The attack can be initiated remotely, requires a high level of complexity, and is considered difficult to carry out. No vendor fix has yet been issued.
Affected Systems
All instances of Vercel AI up to and including version 3.0.97 are affected. The flaw resides in a workflow component that processes pull‑request branch names and is active in any repository configured with the default prettier‑on‑automerge.yml action.
Risk and Exploitability
The CVSS score is 2.3, indicating a low severity overall. EPSS information is not available and the vulnerability is not listed in the CISA KEV catalog. Exploitation would require an attacker to trigger the workflow with crafted input; the overall likelihood remains low, but the potential impact of executing arbitrary shell commands is severe if the path is successfully abused.
OpenCVE Enrichment