Description
A vulnerability was found in vercel ai up to 3.0.97. The affected element is the function validateDownloadUrl of the file packages/provider-utils/src/download-blob.ts of the component provider-utils. The manipulation results in server-side request forgery. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-17
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Vercel AI’s validateDownloadUrl function in provider‑utils allows an unauthenticated remote attacker to supply an arbitrary URL, causing the server to issue an HTTP request to that target. This server‑side request forgery (SSRF) can lead to disclosure of internal resources, disallowed access to internal networks, or facilitation of broader reconnaissance or lateral movement. The weakness is identified as CWE‑918 and carries a CVSS score of 6.9, indicating moderate severity.

Affected Systems

Affected vendor is Vercel, product Vercel AI, versions up to 3.0.97 are vulnerable. The issue resides in the packages/provider‑utils/src/download‑blob.ts file of the provider‑utils component. No other product or version information is provided.

Risk and Exploitability

The CVSS score of 6.9 reflects moderate impact, and an EPSS score is unavailable, implying limited publicly available data on exploitation probability. The vulnerability is not listed in CISA’s KEV catalog, suggesting no known large‑scale exploitation yet, but publicly disclosed exploits exist. Because the attack vector is remote and requires no special user privileges, the risk to any deployed instance of Vercel AI that has not applied a patch is significant, particularly if the application allows outbound traffic to arbitrary destinations.

Generated by OpenCVE AI on May 18, 2026 at 01:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of Vercel AI that includes the SSRF fix, ensuring it is newer than 3.0.97.
  • If an upgrade is not immediately possible, block outbound HTTP/HTTPS traffic from the deployment to internal IP ranges or untrusted hosts using a firewall or CDN ruleset.
  • When upgrading is delayed, implement a whitelist or strict input validation for URLs passed to validateDownloadUrl to restrict requests to approved domains only.

Generated by OpenCVE AI on May 18, 2026 at 01:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 17 May 2026 23:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in vercel ai up to 3.0.97. The affected element is the function validateDownloadUrl of the file packages/provider-utils/src/download-blob.ts of the component provider-utils. The manipulation results in server-side request forgery. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title vercel ai provider-utils download-blob.ts validateDownloadUrl server-side request forgery
First Time appeared Vercel
Vercel ai
Weaknesses CWE-918
CPEs cpe:2.3:a:vercel:ai:*:*:*:*:*:*:*:*
Vendors & Products Vercel
Vercel ai
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-17T22:45:09.929Z

Reserved: 2026-05-17T09:28:06.447Z

Link: CVE-2026-8768

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T23:17:02.997

Modified: 2026-05-17T23:17:02.997

Link: CVE-2026-8768

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T02:00:11Z

Weaknesses