shipfeedAI news, curated daily

23:04:44 CET
20 MAY23:04:44shipfeed
pull to refreshlast sync
Just in — 30 new
§ feed · storyline

CVE-2025-48985: Input Validation Bypass on AI SDK

Vercel's AI SDK patches CVE-2025-48985, a low-severity input validation bypass allowing file type whitelist circumvention, fixed in versions 5.0.52 and 6.0.0-beta.

Nov 6 · · primary fetch1 sourceupdated Nov 6 ·

A low-severity in Vercel's AI SDK was responsibly disclosed, and has been fixed for 5.0.52, 6.0.0-beta.* The issue may have allowed users to bypass filetype whitelists when uploading files. security vulnerability Vercel customers are encouraged to upgrade to the latest version. Read more details below. Vulnerability in Vercel's AI SDK prompt conversion pipeline where improper URL-to-data mapping allows attackers to substitute arbitrary downloaded bytes for different supported URLs within the same prompt. The vulnerability occurs in the file when filtering downloaded results could cause index misalignment between the downloadedFiles array and the original plannedDownloads array.convert-to-language-model-prompt.ts When processing mixed supported and unsupported URLs, the filtering operation removes null entries for supported URLs, causing the remaining downloaded data to be incorrectly associated with different URL keys.

This results in bytes from an unsupported URL being mapped to a supported URL slot, allowing attackers to inject arbitrary content while bypassing URL-based trust and content validation mechanisms. This affects most methods that accepted images or files as inputs…

read full article on vercel.com
§ sources1 publication · timeline below
  1. vercel.comCVE-2025-48985: Input Validation Bypass on AI SDKprimary