{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-8769","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-05-17T09:28:09.002Z","datePublished":"2026-05-17T23:00:13.988Z","dateUpdated":"2026-05-18T20:13:40.558Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-05-17T23:00:13.988Z"},"title":"vercel ai provider-utils response-handler.ts createJsonErrorResponseHandler resource consumption","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-400","lang":"en","description":"Resource Consumption"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"vercel","product":"ai","versions":[{"version":"3.0.0","status":"affected"},{"version":"3.0.1","status":"affected"},{"version":"3.0.2","status":"affected"},{"version":"3.0.3","status":"affected"},{"version":"3.0.4","status":"affected"},{"version":"3.0.5","status":"affected"},{"version":"3.0.6","status":"affected"},{"version":"3.0.7","status":"affected"},{"version":"3.0.8","status":"affected"},{"version":"3.0.9","status":"affected"},{"version":"3.0.10","status":"affected"},{"version":"3.0.11","status":"affected"},{"version":"3.0.12","status":"affected"},{"version":"3.0.13","status":"affected"},{"version":"3.0.14","status":"affected"},{"version":"3.0.15","status":"affected"},{"version":"3.0.16","status":"affected"},{"version":"3.0.17","status":"affected"},{"version":"3.0.18","status":"affected"},{"version":"3.0.19","status":"affected"},{"version":"3.0.20","status":"affected"},{"version":"3.0.21","status":"affected"},{"version":"3.0.22","status":"affected"},{"version":"3.0.23","status":"affected"},{"version":"3.0.24","status":"affected"},{"version":"3.0.25","status":"affected"},{"version":"3.0.26","status":"affected"},{"version":"3.0.27","status":"affected"},{"version":"3.0.28","status":"affected"},{"version":"3.0.29","status":"affected"},{"version":"3.0.30","status":"affected"},{"version":"3.0.31","status":"affected"},{"version":"3.0.32","status":"affected"},{"version":"3.0.33","status":"affected"},{"version":"3.0.34","status":"affected"},{"version":"3.0.35","status":"affected"},{"version":"3.0.36","status":"affected"},{"version":"3.0.37","status":"affected"},{"version":"3.0.38","status":"affected"},{"version":"3.0.39","status":"affected"},{"version":"3.0.40","status":"affected"},{"version":"3.0.41","status":"affected"},{"version":"3.0.42","status":"affected"},{"version":"3.0.43","status":"affected"},{"version":"3.0.44","status":"affected"},{"version":"3.0.45","status":"affected"},{"version":"3.0.46","status":"affected"},{"version":"3.0.47","status":"affected"},{"version":"3.0.48","status":"affected"},{"version":"3.0.49","status":"affected"},{"version":"3.0.50","status":"affected"},{"version":"3.0.51","status":"affected"},{"version":"3.0.52","status":"affected"},{"version":"3.0.53","status":"affected"},{"version":"3.0.54","status":"affected"},{"version":"3.0.55","status":"affected"},{"version":"3.0.56","status":"affected"},{"version":"3.0.57","status":"affected"},{"version":"3.0.58","status":"affected"},{"version":"3.0.59","status":"affected"},{"version":"3.0.60","status":"affected"},{"version":"3.0.61","status":"affected"},{"version":"3.0.62","status":"affected"},{"version":"3.0.63","status":"affected"},{"version":"3.0.64","status":"affected"},{"version":"3.0.65","status":"affected"},{"version":"3.0.66","status":"affected"},{"version":"3.0.67","status":"affected"},{"version":"3.0.68","status":"affected"},{"version":"3.0.69","status":"affected"},{"version":"3.0.70","status":"affected"},{"version":"3.0.71","status":"affected"},{"version":"3.0.72","status":"affected"},{"version":"3.0.73","status":"affected"},{"version":"3.0.74","status":"affected"},{"version":"3.0.75","status":"affected"},{"version":"3.0.76","status":"affected"},{"version":"3.0.77","status":"affected"},{"version":"3.0.78","status":"affected"},{"version":"3.0.79","status":"affected"},{"version":"3.0.80","status":"affected"},{"version":"3.0.81","status":"affected"},{"version":"3.0.82","status":"affected"},{"version":"3.0.83","status":"affected"},{"version":"3.0.84","status":"affected"},{"version":"3.0.85","status":"affected"},{"version":"3.0.86","status":"affected"},{"version":"3.0.87","status":"affected"},{"version":"3.0.88","status":"affected"},{"version":"3.0.89","status":"affected"},{"version":"3.0.90","status":"affected"},{"version":"3.0.91","status":"affected"},{"version":"3.0.92","status":"affected"},{"version":"3.0.93","status":"affected"},{"version":"3.0.94","status":"affected"},{"version":"3.0.95","status":"affected"},{"version":"3.0.96","status":"affected"},{"version":"3.0.97","status":"affected"}],"cpes":["cpe:2.3:a:vercel:ai:*:*:*:*:*:*:*:*"],"modules":["provider-utils"]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in vercel ai up to 3.0.97. The impacted element is the function createJsonResponseHandler/createJsonErrorResponseHandler of the file packages/provider-utils/src/response-handler.ts of the component provider-utils. This manipulation causes resource consumption. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-05-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-05-17T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-05-17T11:33:28.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Eric-f (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/364394","name":"VDB-364394 | vercel ai provider-utils response-handler.ts createJsonErrorResponseHandler resource consumption","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/364394/cti","name":"VDB-364394 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/811406","name":"Submit #811406 | vercel ai @ai-sdk/amazon-bedrock@3.0.97 Uncontrolled Resource Consumption (CWE-400)","tags":["third-party-advisory"]},{"url":"https://gist.github.com/YLChen-007/fb1096bc8428bed9a428f764d9d103bb","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-18T20:12:31.099819Z","id":"CVE-2026-8769","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-18T20:13:40.558Z"}}]}}