Vercel AI SSRF (CVE-2026-8768) Poses Remote Threat
A critical server-side request forgery (SSRF) vulnerability, identified as CVE-2026-8768, has been disclosed in Vercel AI, affecting versions up to 3.0.97. The flaw resides within the validateDownloadUrl function of the provider-utils component, specifically in the packages/provider-utils/src/download-blob.ts file. This vulnerability allows for remote exploitation, enabling attackers to force the server to make arbitrary requests.
The National Vulnerability Database reports a CVSS score of 7.3 (HIGH) for CVE-2026-8768. The attack vector is network-based, requires no privileges or user interaction, and impacts confidentiality, integrity, and availability. The exploit code for this vulnerability is publicly available, significantly increasing the immediate risk to unpatched systems. Vercel was reportedly notified prior to public disclosure but did not issue a response.
This SSRF vulnerability is a serious concern for any organization leveraging Vercel AI. Attackers can exploit this to access internal systems, enumerate network configurations, or even trigger actions on other services. The public availability of exploit code means defenders have a narrow window to mitigate before widespread attacks begin. Organizations must prioritize patching or implementing compensating controls immediately.
What This Means For You
- If your organization utilizes Vercel AI up to version 3.0.97, you are directly exposed to a high-severity remote SSRF. Immediately identify all instances of Vercel AI within your infrastructure, assess their exposure, and prioritize patching or isolating these systems. Audit logs for any unusual outbound connections from Vercel AI components.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Vercel AI SSRF via download-blob.ts - CVE-2026-8768
title: Vercel AI SSRF via download-blob.ts - CVE-2026-8768
id: scw-2026-05-17-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit the CVE-2026-8768 vulnerability in Vercel AI. This rule specifically looks for HTTP POST requests targeting the '/download-blob.ts' endpoint with a 'url=' parameter in the query string, which is indicative of an SSRF attack attempting to abuse the validateDownloadUrl function.
author: SCW Feed Engine (AI-generated)
date: 2026-05-17
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-8768/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/download-blob.ts'
cs-method:
- 'POST'
cs-uri-query|contains:
- 'url='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-8768 | SSRF | vercel ai up to 3.0.97 |
| CVE-2026-8768 | SSRF | Function: validateDownloadUrl in packages/provider-utils/src/download-blob.ts |
| CVE-2026-8768 | SSRF | Component: provider-utils |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 18, 2026 at 02:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.