@sveltejs/adapter-vercel is vulnerable to Acceptance of Extraneous Untrusted Data With Trusted Data
75
High Risk
Affected versions of this package are vulnerable to cache poisoning. An internal query parameter intended for Incremental Static Regeneration (ISR) is exposed on all routes and can be manipulated by attackers to alter caching behavior, allowing user-specific or sensitive responses to be cached and subsequently served to other users. Successful exploitation requires an authenticated victim to visit an attacker-controlled link.
You are affected if you are using a version that falls within the vulnerable range.
@sveltejs/adapter-vercel is vulnerable to Acceptance of Extraneous Untrusted Data With Trusted Data in versions 0.0.1 - 6.3.1.
Upgrade the @sveltejs/adapter-vercel library to a patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant