@sveltejs/adapter-vercel is vulnerable to Acceptance of Extraneous Untrusted Data With Trusted Data
75
High Risk
Affected versions of this package are vulnerable to cache poisoning. An internal query parameter intended for Incremental Static Regeneration (ISR) is exposed on all routes and can be manipulated by attackers to alter caching behavior, allowing user-specific or sensitive responses to be cached and subsequently served to other users. Successful exploitation requires an authenticated victim to visit an attacker-controlled link.
You are affected if you are using a version that falls within the vulnerable range.
@sveltejs/adapter-vercel is vulnerable to Acceptance of Extraneous Untrusted Data With Trusted Data in versions 0.0.1 - 6.3.1.
Upgrade the @sveltejs/adapter-vercel library to a patch version.
Connect your repositories to instantly see whether vulnerable or malicious packages exist in your codebase.
Free. No credit card required.

SOC 2Compliant
ISO 27001Compliant