Home

Description

The Deployment Infrastructure in Mintlify Platform before 2025-11-15 allows remote attackers to bypass security patches and execute downgrade attacks via predictable deployment identifiers on the Vercel preview domain. An attacker can identify the URL structure of a previous deployment that contains unpatched vulnerabilities. By browsing directly to the specific git-ref or deployment-id subdomain, the attacker can force the application to load the vulnerable version.

PUBLISHED Reserved 2025-12-12 | Published 2025-12-19 | Updated 2025-12-19 | Assigner mitre




MEDIUM: 4.9CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-472 External Control of Assumed-Immutable Web Parameter

Product status

Default status
unaffected

Any version before 2025-11-15
affected

References

www.mintlify.com/docs/changelog

www.mintlify.com/...-with-security-researchers-november-2025

kibty.town/blog/mintlify/

news.ycombinator.com/item?id=46317098

cve.org (CVE-2025-67846)

nvd.nist.gov (CVE-2025-67846)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.