Description

SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Versions of @sveltejs/adapter-vercel prior to 6.3.2 are vulnerable to cache poisoning. An internal query parameter intended for Incremental Static Regeneration (ISR) is accessible on all routes, allowing an attacker to cause sensitive user-specific responses to be cached and served to other users. Successful exploitation requires a victim to visit an attacker-controlled link while authenticated. Existing deployments are protected by Vercel's WAF, but users should upgrade as soon as possible. This vulnerability is fixed in 6.3.2.

INFO

Published Date :

2026-02-20T21:24:55.577Z

Last Modified :

2026-02-24T18:42:11.028Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-27118 vulnerability.

Vendors Products
Svelte
  • Kit
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-27118.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability