CVE-2026-27118: CWE-346: Origin Validation Error in sveltejs kit
SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Versions of @sveltejs/adapter-vercel prior to 6.3.2 are vulnerable to cache poisoning. An internal query parameter intended for Incremental Static Regeneration (ISR) is accessible on all routes, allowing an attacker to cause sensitive user-specific responses to be cached and served to other users. Successful exploitation requires a victim to visit an attacker-controlled link while authenticated. Existing deployments are protected by Vercel's WAF, but users should upgrade as soon as possible. This vulnerability is fixed in 6.3.2.
AI Analysis
Technical Summary
CVE-2026-27118 affects the @sveltejs/adapter-vercel package used in the SvelteKit framework, which facilitates rapid development of performant web applications. The vulnerability arises from improper origin validation related to an internal query parameter designed for Incremental Static Regeneration (ISR). This parameter is accessible on all routes, enabling attackers to manipulate cache behavior. Specifically, an attacker can craft a URL containing this parameter that, when visited by an authenticated user, causes the server to cache personalized responses. Subsequent users accessing the same cached content may receive sensitive data not intended for them, leading to information disclosure. The flaw is categorized under CWE-346 (Origin Validation Error), indicating a failure to properly verify the origin of requests before caching. The vulnerability does not require the attacker to have privileges or authentication, but successful exploitation depends on tricking a victim into clicking a malicious link while authenticated. Although Vercel’s WAF provides some defense by filtering malicious requests, it is not a complete mitigation. The issue was addressed in version 6.3.2 of @sveltejs/adapter-vercel by correcting the origin validation and cache handling logic to prevent poisoning. The CVSS 4.0 base score is 5.3, reflecting a medium severity due to the moderate impact on confidentiality and the requirement for user interaction.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive user-specific information due to cache poisoning. Organizations using vulnerable versions of @sveltejs/adapter-vercel risk exposing personal data or session-specific content to other users, potentially violating privacy regulations and damaging user trust. This can lead to data breaches, compliance violations (e.g., GDPR, CCPA), and reputational harm. Since the vulnerability affects web applications built with SvelteKit deployed on Vercel, any service relying on these technologies is at risk. Attackers can exploit this to harvest sensitive data such as authentication tokens, personal details, or proprietary information. The requirement for user interaction limits automated widespread exploitation but targeted phishing or social engineering attacks could be effective. The presence of Vercel’s WAF reduces risk but does not eliminate it, especially for self-hosted or misconfigured deployments. Overall, the vulnerability undermines the integrity of caching mechanisms and confidentiality of user data, posing a moderate threat to organizations worldwide.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade @sveltejs/adapter-vercel to version 6.3.2 or later, where the origin validation and cache poisoning issues are fixed. Review and audit caching configurations to ensure that user-specific or sensitive responses are not cached globally or shared across users. Implement strict validation of query parameters related to ISR to prevent unauthorized cache manipulation. Employ Content Security Policy (CSP) and other browser security headers to reduce the risk of malicious link exploitation. Educate users about phishing risks to minimize the chance of clicking attacker-controlled links while authenticated. For deployments on Vercel, verify that the WAF is enabled and properly configured to filter suspicious requests. Consider implementing additional application-layer protections such as user session binding to cached content or cache partitioning by user identity. Regularly monitor logs for unusual cache behavior or access patterns indicative of exploitation attempts. Finally, maintain an up-to-date inventory of SvelteKit versions in use and apply security patches promptly.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-27118: CWE-346: Origin Validation Error in sveltejs kit
Description
SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Versions of @sveltejs/adapter-vercel prior to 6.3.2 are vulnerable to cache poisoning. An internal query parameter intended for Incremental Static Regeneration (ISR) is accessible on all routes, allowing an attacker to cause sensitive user-specific responses to be cached and served to other users. Successful exploitation requires a victim to visit an attacker-controlled link while authenticated. Existing deployments are protected by Vercel's WAF, but users should upgrade as soon as possible. This vulnerability is fixed in 6.3.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27118 affects the @sveltejs/adapter-vercel package used in the SvelteKit framework, which facilitates rapid development of performant web applications. The vulnerability arises from improper origin validation related to an internal query parameter designed for Incremental Static Regeneration (ISR). This parameter is accessible on all routes, enabling attackers to manipulate cache behavior. Specifically, an attacker can craft a URL containing this parameter that, when visited by an authenticated user, causes the server to cache personalized responses. Subsequent users accessing the same cached content may receive sensitive data not intended for them, leading to information disclosure. The flaw is categorized under CWE-346 (Origin Validation Error), indicating a failure to properly verify the origin of requests before caching. The vulnerability does not require the attacker to have privileges or authentication, but successful exploitation depends on tricking a victim into clicking a malicious link while authenticated. Although Vercel’s WAF provides some defense by filtering malicious requests, it is not a complete mitigation. The issue was addressed in version 6.3.2 of @sveltejs/adapter-vercel by correcting the origin validation and cache handling logic to prevent poisoning. The CVSS 4.0 base score is 5.3, reflecting a medium severity due to the moderate impact on confidentiality and the requirement for user interaction.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive user-specific information due to cache poisoning. Organizations using vulnerable versions of @sveltejs/adapter-vercel risk exposing personal data or session-specific content to other users, potentially violating privacy regulations and damaging user trust. This can lead to data breaches, compliance violations (e.g., GDPR, CCPA), and reputational harm. Since the vulnerability affects web applications built with SvelteKit deployed on Vercel, any service relying on these technologies is at risk. Attackers can exploit this to harvest sensitive data such as authentication tokens, personal details, or proprietary information. The requirement for user interaction limits automated widespread exploitation but targeted phishing or social engineering attacks could be effective. The presence of Vercel’s WAF reduces risk but does not eliminate it, especially for self-hosted or misconfigured deployments. Overall, the vulnerability undermines the integrity of caching mechanisms and confidentiality of user data, posing a moderate threat to organizations worldwide.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade @sveltejs/adapter-vercel to version 6.3.2 or later, where the origin validation and cache poisoning issues are fixed. Review and audit caching configurations to ensure that user-specific or sensitive responses are not cached globally or shared across users. Implement strict validation of query parameters related to ISR to prevent unauthorized cache manipulation. Employ Content Security Policy (CSP) and other browser security headers to reduce the risk of malicious link exploitation. Educate users about phishing risks to minimize the chance of clicking attacker-controlled links while authenticated. For deployments on Vercel, verify that the WAF is enabled and properly configured to filter suspicious requests. Consider implementing additional application-layer protections such as user session binding to cached content or cache partitioning by user identity. Regularly monitor logs for unusual cache behavior or access patterns indicative of exploitation attempts. Finally, maintain an up-to-date inventory of SvelteKit versions in use and apply security patches promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-17T18:42:27.043Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6998d2dfbe58cf853bb9b978
Added to database: 2/20/2026, 9:32:15 PM
Last enriched: 2/28/2026, 12:37:23 PM
Last updated: 4/6/2026, 6:02:33 AM
Views: 830
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.