The Deployment Infrastructure in Mintlify Platform before 2025-11-15 allows remote attackers to bypass security patches and execute downgrade attacks via predictable deployment identifiers on the Vercel preview domain. An attacker can identify the URL structure of a previous deployment that contains unpatched vulnerabilities. By browsing directly to the specific git-ref or deployment-id subdomain, the attacker can force the application to load the vulnerable version.
References
| Link | Resource |
|---|---|
| https://kibty.town/blog/mintlify/ | Exploit Third Party Advisory |
| https://news.ycombinator.com/item?id=46317098 | Issue Tracking |
| https://www.mintlify.com/blog/working-with-security-researchers-november-2025 | Vendor Advisory |
| https://www.mintlify.com/docs/changelog | Release Notes |
Configurations
History
No history.
Information
Published : 2025-12-19 02:16
Updated : 2026-01-02 15:46
NVD link : CVE-2025-67846
Mitre link : CVE-2025-67846
CVE.ORG link : CVE-2025-67846
JSON object : View
Products Affected
mintlify
- mintlify
CWE
CWE-472
External Control of Assumed-Immutable Web Parameter
