CVE-2026-27118 PUBLISHED

Cache poisoning in @sveltejs/adapter-vercel

Assigner: GitHub_M
Reserved: 17.02.2026 Published: 20.02.2026 Updated: 20.02.2026

SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Versions of @sveltejs/adapter-vercel prior to 6.3.2 are vulnerable to cache poisoning. An internal query parameter intended for Incremental Static Regeneration (ISR) is accessible on all routes, allowing an attacker to cause sensitive user-specific responses to be cached and served to other users. Successful exploitation requires a victim to visit an attacker-controlled link while authenticated. Existing deployments are protected by Vercel's WAF, but users should upgrade as soon as possible. This vulnerability is fixed in 6.3.2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 5.3

Product Status

Vendor sveltejs
Product kit
Versions
  • Version < 6.3.2 is affected

References

Problem Types

  • CWE-346: Origin Validation Error CWE