{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-8768","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-05-17T09:28:06.447Z","datePublished":"2026-05-17T22:45:09.929Z","dateUpdated":"2026-05-18T10:41:00.465Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-05-17T22:45:09.929Z"},"title":"vercel ai provider-utils download-blob.ts validateDownloadUrl server-side request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-918","lang":"en","description":"Server-Side Request Forgery"}]}],"affected":[{"vendor":"vercel","product":"ai","versions":[{"version":"3.0.0","status":"affected"},{"version":"3.0.1","status":"affected"},{"version":"3.0.2","status":"affected"},{"version":"3.0.3","status":"affected"},{"version":"3.0.4","status":"affected"},{"version":"3.0.5","status":"affected"},{"version":"3.0.6","status":"affected"},{"version":"3.0.7","status":"affected"},{"version":"3.0.8","status":"affected"},{"version":"3.0.9","status":"affected"},{"version":"3.0.10","status":"affected"},{"version":"3.0.11","status":"affected"},{"version":"3.0.12","status":"affected"},{"version":"3.0.13","status":"affected"},{"version":"3.0.14","status":"affected"},{"version":"3.0.15","status":"affected"},{"version":"3.0.16","status":"affected"},{"version":"3.0.17","status":"affected"},{"version":"3.0.18","status":"affected"},{"version":"3.0.19","status":"affected"},{"version":"3.0.20","status":"affected"},{"version":"3.0.21","status":"affected"},{"version":"3.0.22","status":"affected"},{"version":"3.0.23","status":"affected"},{"version":"3.0.24","status":"affected"},{"version":"3.0.25","status":"affected"},{"version":"3.0.26","status":"affected"},{"version":"3.0.27","status":"affected"},{"version":"3.0.28","status":"affected"},{"version":"3.0.29","status":"affected"},{"version":"3.0.30","status":"affected"},{"version":"3.0.31","status":"affected"},{"version":"3.0.32","status":"affected"},{"version":"3.0.33","status":"affected"},{"version":"3.0.34","status":"affected"},{"version":"3.0.35","status":"affected"},{"version":"3.0.36","status":"affected"},{"version":"3.0.37","status":"affected"},{"version":"3.0.38","status":"affected"},{"version":"3.0.39","status":"affected"},{"version":"3.0.40","status":"affected"},{"version":"3.0.41","status":"affected"},{"version":"3.0.42","status":"affected"},{"version":"3.0.43","status":"affected"},{"version":"3.0.44","status":"affected"},{"version":"3.0.45","status":"affected"},{"version":"3.0.46","status":"affected"},{"version":"3.0.47","status":"affected"},{"version":"3.0.48","status":"affected"},{"version":"3.0.49","status":"affected"},{"version":"3.0.50","status":"affected"},{"version":"3.0.51","status":"affected"},{"version":"3.0.52","status":"affected"},{"version":"3.0.53","status":"affected"},{"version":"3.0.54","status":"affected"},{"version":"3.0.55","status":"affected"},{"version":"3.0.56","status":"affected"},{"version":"3.0.57","status":"affected"},{"version":"3.0.58","status":"affected"},{"version":"3.0.59","status":"affected"},{"version":"3.0.60","status":"affected"},{"version":"3.0.61","status":"affected"},{"version":"3.0.62","status":"affected"},{"version":"3.0.63","status":"affected"},{"version":"3.0.64","status":"affected"},{"version":"3.0.65","status":"affected"},{"version":"3.0.66","status":"affected"},{"version":"3.0.67","status":"affected"},{"version":"3.0.68","status":"affected"},{"version":"3.0.69","status":"affected"},{"version":"3.0.70","status":"affected"},{"version":"3.0.71","status":"affected"},{"version":"3.0.72","status":"affected"},{"version":"3.0.73","status":"affected"},{"version":"3.0.74","status":"affected"},{"version":"3.0.75","status":"affected"},{"version":"3.0.76","status":"affected"},{"version":"3.0.77","status":"affected"},{"version":"3.0.78","status":"affected"},{"version":"3.0.79","status":"affected"},{"version":"3.0.80","status":"affected"},{"version":"3.0.81","status":"affected"},{"version":"3.0.82","status":"affected"},{"version":"3.0.83","status":"affected"},{"version":"3.0.84","status":"affected"},{"version":"3.0.85","status":"affected"},{"version":"3.0.86","status":"affected"},{"version":"3.0.87","status":"affected"},{"version":"3.0.88","status":"affected"},{"version":"3.0.89","status":"affected"},{"version":"3.0.90","status":"affected"},{"version":"3.0.91","status":"affected"},{"version":"3.0.92","status":"affected"},{"version":"3.0.93","status":"affected"},{"version":"3.0.94","status":"affected"},{"version":"3.0.95","status":"affected"},{"version":"3.0.96","status":"affected"},{"version":"3.0.97","status":"affected"}],"cpes":["cpe:2.3:a:vercel:ai:*:*:*:*:*:*:*:*"],"modules":["provider-utils"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in vercel ai up to 3.0.97. The affected element is the function validateDownloadUrl of the file packages/provider-utils/src/download-blob.ts of the component provider-utils. The manipulation results in server-side request forgery. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-05-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-05-17T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-05-17T11:33:13.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Eric-f (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/364393","name":"VDB-364393 | vercel ai provider-utils download-blob.ts validateDownloadUrl server-side request forgery","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/364393/cti","name":"VDB-364393 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/811404","name":"Submit #811404 | vercel ai @ai-sdk/amazon-bedrock@3.0.97 Server-Side Request Forgery (SSRF) (CWE-918)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/submit/811405","name":"Submit #811405 | vercel ai @ai-sdk/amazon-bedrock@3.0.97 Server-Side Request Forgery (SSRF) (CWE-918) (Duplicate)","tags":["third-party-advisory"]},{"url":"https://gist.github.com/YLChen-007/07d149bd68adbee58165b4207a2abc71","tags":["related"]},{"url":"https://gist.github.com/YLChen-007/cf7e47e4dda392f474ca77a66d1d847f","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-18T10:28:23.079110Z","id":"CVE-2026-8768","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-18T10:41:00.465Z"}}]}}