CVE-2025-67846
Unknown Unknown - Not Provided
Deployment ID Predictability Enables Downgrade Attacks in Mintlify

Publication date: 2025-12-19

Last updated on: 2025-12-19

Assigner: MITRE

Description
The Deployment Infrastructure in Mintlify Platform before 2025-11-15 allows remote attackers to bypass security patches and execute downgrade attacks via predictable deployment identifiers on the Vercel preview domain. An attacker can identify the URL structure of a previous deployment that contains unpatched vulnerabilities. By browsing directly to the specific git-ref or deployment-id subdomain, the attacker can force the application to load the vulnerable version.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-19
Last Modified
2025-12-19
Generated
2026-05-07
AI Q&A
2025-12-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mintlify platform *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-472 The web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable, such as hidden form fields.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Mintlify Platform's Deployment Infrastructure allows remote attackers to bypass security patches by exploiting predictable deployment identifiers on the Vercel preview domain. Attackers can find URLs of previous deployments that have unpatched vulnerabilities and access those older, vulnerable versions by navigating to specific git-ref or deployment-id subdomains, effectively forcing the application to load a downgraded, insecure version.


How can this vulnerability impact me? :

The vulnerability can allow attackers to execute downgrade attacks, causing the application to run older, vulnerable versions. This can lead to partial compromise of confidentiality and integrity of the system, as indicated by the CVSS score, potentially exposing sensitive data or allowing unauthorized changes without affecting availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart