Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67846: CWE-472 External Control of Assumed-Immutable Web Parameter in Mintlify Mintlify Platform

0
Medium
VulnerabilityCVE-2025-67846cvecve-2025-67846cwe-472
Published: Fri Dec 19 2025 (12/19/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Mintlify
Product: Mintlify Platform

Description

The Deployment Infrastructure in Mintlify Platform before 2025-11-15 allows remote attackers to bypass security patches and execute downgrade attacks via predictable deployment identifiers on the Vercel preview domain. An attacker can identify the URL structure of a previous deployment that contains unpatched vulnerabilities. By browsing directly to the specific git-ref or deployment-id subdomain, the attacker can force the application to load the vulnerable version.

AI-Powered Analysis

AILast updated: 12/19/2025, 02:41:57 UTC

Technical Analysis

CVE-2025-67846 identifies a security weakness in the Mintlify Platform's deployment infrastructure prior to the patch date of November 15, 2025. The vulnerability is classified under CWE-472, which involves external control of assumed-immutable web parameters. Specifically, the Mintlify Platform uses predictable deployment identifiers on the Vercel preview domain, such as git-ref or deployment-id subdomains, to serve different versions of deployed applications. An attacker who can discover these predictable URLs can bypass security patches by directly accessing older deployments that contain known vulnerabilities. This effectively enables downgrade attacks where the attacker forces the system to load a vulnerable version of the application, circumventing any security fixes applied in later versions. The attack vector is network-based (AV:N), requires low privileges (PR:L), and does not require user interaction (UI:N). The vulnerability impacts confidentiality and integrity by exposing outdated code that may leak sensitive information or allow unauthorized modifications. However, availability is not affected. The CVSS v3.1 base score is 4.9, indicating medium severity, with a high attack complexity (AC:H) due to the need to identify valid deployment URLs. No known exploits have been reported in the wild as of the publication date. The vulnerability affects all versions prior to the fix date, and no official patches or mitigation links were provided at the time of reporting.

Potential Impact

For European organizations using the Mintlify Platform, particularly those leveraging Vercel for deployment previews, this vulnerability could lead to unauthorized access to outdated application versions containing unpatched security flaws. This exposure risks leaking confidential information or allowing attackers to manipulate application behavior by exploiting known vulnerabilities in older versions. The ability to bypass security patches undermines the integrity of the deployment process and could facilitate further attacks such as data exfiltration or privilege escalation. While availability is not directly impacted, the compromise of confidentiality and integrity can have significant reputational and compliance consequences, especially under GDPR regulations. Organizations in sectors with high regulatory scrutiny or handling sensitive data, such as finance, healthcare, and government, are particularly at risk. The medium severity rating suggests that while exploitation is possible, it requires some effort to identify valid deployment URLs, limiting widespread automated attacks. Nonetheless, the strategic importance of maintaining secure deployment pipelines means this vulnerability should be addressed promptly to prevent potential exploitation.

Mitigation Recommendations

European organizations should immediately audit their use of the Mintlify Platform and Vercel preview deployments to identify exposure to predictable deployment URLs. Specific mitigations include: 1) Implementing access controls on preview deployments to restrict public access, such as IP whitelisting or authentication requirements. 2) Avoiding predictable naming conventions for deployment identifiers to reduce the risk of URL guessing. 3) Regularly purging or disabling outdated preview deployments to minimize the attack surface. 4) Monitoring web server logs for suspicious access patterns targeting git-ref or deployment-id subdomains. 5) Coordinating with Mintlify to apply any forthcoming patches or updates that address this vulnerability. 6) Incorporating security testing in the deployment pipeline to detect and prevent exposure of vulnerable versions. 7) Educating development and operations teams about the risks of exposing preview environments publicly. These measures go beyond generic patching advice by focusing on deployment hygiene and access restrictions specific to the vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944b7d24eb3efac36c40a5d

Added to database: 12/19/2025, 2:26:26 AM

Last enriched: 12/19/2025, 2:41:57 AM

Last updated: 12/19/2025, 5:16:48 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats