{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-8767","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-05-17T09:28:03.647Z","datePublished":"2026-05-17T22:30:09.659Z","dateUpdated":"2026-05-18T14:30:55.942Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-05-17T22:30:09.659Z"},"title":"vercel ai PR Branch Name Interpolation prettier-on-automerge.yml run os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"vercel","product":"ai","versions":[{"version":"3.0.0","status":"affected"},{"version":"3.0.1","status":"affected"},{"version":"3.0.2","status":"affected"},{"version":"3.0.3","status":"affected"},{"version":"3.0.4","status":"affected"},{"version":"3.0.5","status":"affected"},{"version":"3.0.6","status":"affected"},{"version":"3.0.7","status":"affected"},{"version":"3.0.8","status":"affected"},{"version":"3.0.9","status":"affected"},{"version":"3.0.10","status":"affected"},{"version":"3.0.11","status":"affected"},{"version":"3.0.12","status":"affected"},{"version":"3.0.13","status":"affected"},{"version":"3.0.14","status":"affected"},{"version":"3.0.15","status":"affected"},{"version":"3.0.16","status":"affected"},{"version":"3.0.17","status":"affected"},{"version":"3.0.18","status":"affected"},{"version":"3.0.19","status":"affected"},{"version":"3.0.20","status":"affected"},{"version":"3.0.21","status":"affected"},{"version":"3.0.22","status":"affected"},{"version":"3.0.23","status":"affected"},{"version":"3.0.24","status":"affected"},{"version":"3.0.25","status":"affected"},{"version":"3.0.26","status":"affected"},{"version":"3.0.27","status":"affected"},{"version":"3.0.28","status":"affected"},{"version":"3.0.29","status":"affected"},{"version":"3.0.30","status":"affected"},{"version":"3.0.31","status":"affected"},{"version":"3.0.32","status":"affected"},{"version":"3.0.33","status":"affected"},{"version":"3.0.34","status":"affected"},{"version":"3.0.35","status":"affected"},{"version":"3.0.36","status":"affected"},{"version":"3.0.37","status":"affected"},{"version":"3.0.38","status":"affected"},{"version":"3.0.39","status":"affected"},{"version":"3.0.40","status":"affected"},{"version":"3.0.41","status":"affected"},{"version":"3.0.42","status":"affected"},{"version":"3.0.43","status":"affected"},{"version":"3.0.44","status":"affected"},{"version":"3.0.45","status":"affected"},{"version":"3.0.46","status":"affected"},{"version":"3.0.47","status":"affected"},{"version":"3.0.48","status":"affected"},{"version":"3.0.49","status":"affected"},{"version":"3.0.50","status":"affected"},{"version":"3.0.51","status":"affected"},{"version":"3.0.52","status":"affected"},{"version":"3.0.53","status":"affected"},{"version":"3.0.54","status":"affected"},{"version":"3.0.55","status":"affected"},{"version":"3.0.56","status":"affected"},{"version":"3.0.57","status":"affected"},{"version":"3.0.58","status":"affected"},{"version":"3.0.59","status":"affected"},{"version":"3.0.60","status":"affected"},{"version":"3.0.61","status":"affected"},{"version":"3.0.62","status":"affected"},{"version":"3.0.63","status":"affected"},{"version":"3.0.64","status":"affected"},{"version":"3.0.65","status":"affected"},{"version":"3.0.66","status":"affected"},{"version":"3.0.67","status":"affected"},{"version":"3.0.68","status":"affected"},{"version":"3.0.69","status":"affected"},{"version":"3.0.70","status":"affected"},{"version":"3.0.71","status":"affected"},{"version":"3.0.72","status":"affected"},{"version":"3.0.73","status":"affected"},{"version":"3.0.74","status":"affected"},{"version":"3.0.75","status":"affected"},{"version":"3.0.76","status":"affected"},{"version":"3.0.77","status":"affected"},{"version":"3.0.78","status":"affected"},{"version":"3.0.79","status":"affected"},{"version":"3.0.80","status":"affected"},{"version":"3.0.81","status":"affected"},{"version":"3.0.82","status":"affected"},{"version":"3.0.83","status":"affected"},{"version":"3.0.84","status":"affected"},{"version":"3.0.85","status":"affected"},{"version":"3.0.86","status":"affected"},{"version":"3.0.87","status":"affected"},{"version":"3.0.88","status":"affected"},{"version":"3.0.89","status":"affected"},{"version":"3.0.90","status":"affected"},{"version":"3.0.91","status":"affected"},{"version":"3.0.92","status":"affected"},{"version":"3.0.93","status":"affected"},{"version":"3.0.94","status":"affected"},{"version":"3.0.95","status":"affected"},{"version":"3.0.96","status":"affected"},{"version":"3.0.97","status":"affected"}],"cpes":["cpe:2.3:a:vercel:ai:*:*:*:*:*:*:*:*"],"modules":["PR Branch Name Interpolation"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in vercel ai up to 3.0.97. Impacted is the function run of the file .github/workflows/prettier-on-automerge.yml of the component PR Branch Name Interpolation. The manipulation leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":2.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":5,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.6,"vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-05-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-05-17T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-05-17T11:33:11.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Eric-d (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/364392","name":"VDB-364392 | vercel ai PR Branch Name Interpolation prettier-on-automerge.yml run os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/364392/cti","name":"VDB-364392 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/811402","name":"Submit #811402 | vercel ai @ai-sdk/amazon-bedrock@3.0.97 OS Command Injection (CWE-78)","tags":["third-party-advisory"]},{"url":"https://gist.github.com/YLChen-007/870bd6966cd84703d91ce54dfea3bdd0","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-18T14:30:43.479216Z","id":"CVE-2026-8767","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-18T14:30:55.942Z"}}]}}