CVE-2026-42047: Inngest Exposes Environment Variables via HTTP Handler

CVE-2026-42047: Inngest Exposes Environment Variables via HTTP Handler

The National Vulnerability Database has detailed CVE-2026-42047, a high-severity vulnerability affecting Inngest versions 3.22.0 through 3.53.1. This flaw allows unauthenticated remote attackers to exfiltrate critical environment variables from the host process. The exposure occurs through Inngest’s serve() HTTP handler when accessed via non-standard methods like PATCH, OPTIONS, or DELETE.

A change introduced in version 3.22.0 inadvertently caused the diagnostic response for these methods to include the contents of process.env. This means sensitive data such as API keys, credentials, and other secrets stored as environment variables are directly exposed. Applications are vulnerable if their serve() endpoint is reachable via these methods, a common configuration in frameworks like Next.js Pages Router or Express applications using app.use(...).

Defenders must recognize the severity here. Attackers can gain a foothold by simply probing for these endpoints, bypassing authentication entirely. The National Vulnerability Database confirms that Next.js App Router handlers exporting only GET, POST, and PUT, and applications using the connect worker method, are not affected. The fix is available in Inngest version 3.54.0. For those unable to upgrade immediately, restricting the serve() endpoint to only accept GET, POST, and PUT requests at the framework or reverse-proxy layer is a critical workaround.

What This Means For You

  • If your organization uses Inngest, immediately check your version and upgrade to 3.54.0 or later to patch CVE-2026-42047. If immediate patching isn't possible, restrict your `serve()` endpoint to ONLY allow GET, POST, and PUT methods at the framework or reverse-proxy level. Assume any exposed Inngest instance on versions 3.22.0-3.53.1 has already had its environment variables compromised and initiate credential rotation for any secrets that might have been present.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1040 Credential Access

CVE-2026-42047: Inngest serve() handler exposed environment variables via non-standard HTTP methods

Sigma YAML — free preview
title: CVE-2026-42047: Inngest serve() handler exposed environment variables via non-standard HTTP methods
id: scw-2026-05-07-ai-1
status: experimental
level: high
description: |
  Detects the use of non-standard HTTP methods (PATCH, OPTIONS, DELETE) against the Inngest serve() handler. Versions 3.22.0 through 3.53.1 of Inngest are vulnerable, allowing unauthenticated remote attackers to exfiltrate environment variables when these methods are used, as they fall through to a generic handler that exposes process.env contents. This rule specifically targets the methods that trigger the vulnerability.
author: SCW Feed Engine (AI-generated)
date: 2026-05-07
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-42047/
tags:
  - attack.credential_access
  - attack.t1040
logsource:
    category: webserver
detection:
  selection:
      cs-method:
          - 'PATCH'
          - 'OPTIONS'
          - 'DELETE'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-42047 Information Disclosure Inngest versions 3.22.0 through 3.53.1
CVE-2026-42047 Information Disclosure Vulnerable component: serve() HTTP handler
CVE-2026-42047 Information Disclosure Attack vector: PATCH, OPTIONS, or DELETE requests to serve() endpoint
CVE-2026-42047 Information Disclosure Affected configurations: Next.js Pages Router or Express's app.use(...) where serve() is reachable via PATCH, OPTIONS, or DELETE
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 08, 2026 at 00:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-8112 — 8421bit MiniClaw Command Injection

CVE-2026-8112 — A vulnerability was found in 8421bit MiniClaw up to 223c16a1088e138838dcbd18cd65a37c35ac5a84. Affected is the function executeCognitivePulse of the file src/kernel.ts. Performing a manipulation results...

vulnerabilityCVEmedium-severitycommand-injectioncwe-77cwe-78
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 3 Sigma

Azure DevOps Critical Info Disclosure: CVE-2026-42826

CVE-2026-42826 — Exposure of sensitive information to an unauthorized actor in Azure DevOps allows an unauthorized attacker to disclose information over a network.

vulnerabilityCVEcriticalhigh-severitycwe-200
/SCW Vulnerability Desk /CRITICAL /10 /⚑ 1 IOC /⚙ 2 Sigma

CVE-2026-41105: Azure Notification Service SSRF Allows Privilege Escalation

CVE-2026-41105 — Server-side request forgery (ssrf) in Azure Notification Service allows an authorized attacker to elevate privileges over a network.

vulnerabilityCVEhigh-severityserver-side-request-forgerycwe-918
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 2 IOCs /⚙ 3 Sigma