CVE-2025-67846

The Deployment Infrastructure in Mintlify Platform before 2025-11-15 allows remote attackers to bypass security patches and execute downgrade attacks via predictable deployment identifiers on the Vercel preview domain. An attacker can identify the URL structure of a previous deployment that contains unpatched vulnerabilities. By browsing directly to the specific git-ref or deployment-id subdomain, the attacker can force the application to load the vulnerable version.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mintlify:mintlify:*:*:*:*:*:*:*:*

History

02 Jan 2026, 15:46

Type Values Removed Values Added
References () https://kibty.town/blog/mintlify/ - () https://kibty.town/blog/mintlify/ - Exploit, Third Party Advisory
References () https://news.ycombinator.com/item?id=46317098 - () https://news.ycombinator.com/item?id=46317098 - Issue Tracking
References () https://www.mintlify.com/blog/working-with-security-researchers-november-2025 - () https://www.mintlify.com/blog/working-with-security-researchers-november-2025 - Vendor Advisory
References () https://www.mintlify.com/docs/changelog - () https://www.mintlify.com/docs/changelog - Release Notes
First Time Mintlify mintlify
Mintlify
CPE cpe:2.3:a:mintlify:mintlify:*:*:*:*:*:*:*:*

19 Dec 2025, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-19 02:16

Updated : 2026-01-02 15:46


NVD link : CVE-2025-67846

Mitre link : CVE-2025-67846

CVE.ORG link : CVE-2025-67846


JSON object : View

Products Affected

mintlify

  • mintlify
CWE
CWE-472

External Control of Assumed-Immutable Web Parameter