Home

Description

Vercel’s AI Cloud is a unified platform for building modern applications. From 50.16.0 to 52.0.0, hen the Vercel CLI runs in non-interactive mode (--non-interactive or auto-detected AI agent), commands that cannot complete autonomously emit JSON payloads with suggested follow-up commands. If the user authenticated via --token or -t on the command line, the token value is included verbatim in those suggestions. The plaintext token may be captured in CI/CD logs, agent transcripts, or other automation output. This vulnerability is fixed in 52.0.1.

PUBLISHED Reserved 2026-05-06 | Published 2026-05-13 | Updated 2026-05-13 | Assigner GitHub_M




MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CWE-532: Insertion of Sensitive Information into Log File

Product status

>= 50.16.0, < 52.0.1
affected

References

github.com/...vercel/security/advisories/GHSA-pgf8-2hgj-grqg

cve.org (CVE-2026-44479)

nvd.nist.gov (CVE-2026-44479)

Download JSON