Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @sveltejs/adapter-vercel
  4. ›
  5. CVE-2026-27118

CVE-2026-27118: Cache poisoning in @sveltejs/adapter-vercel

February 19, 2026 (updated February 23, 2026)

Versions of @sveltejs/adapter-vercel prior to 6.3.2 are vulnerable to cache poisoning. An internal query parameter intended for Incremental Static Regeneration (ISR) is accessible on all routes, allowing an attacker to cause sensitive user-specific responses to be cached and served to other users.

Successful exploitation requires a victim to visit an attacker-controlled link while authenticated.

Existing deployments are protected by Vercel’s WAF, but users should upgrade as soon as possible.

References

  • github.com/advisories/GHSA-9pq4-5hcf-288c
  • github.com/sveltejs/kit
  • github.com/sveltejs/kit/security/advisories/GHSA-9pq4-5hcf-288c
  • nvd.nist.gov/vuln/detail/CVE-2026-27118

Code Behaviors & Features

Detect and mitigate CVE-2026-27118 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.3.2

Fixed versions

  • 6.3.2

Solution

Upgrade to version 6.3.2 or above.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-346: Origin Validation Error

Source file

npm/@sveltejs/adapter-vercel/CVE-2026-27118.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 25 Mar 2026 00:17:50 +0000.