GHSA-rwvc-j5jr-mgvh: update CVSS to match NVD assessment, enrich description#7384
Open
PiniShv wants to merge 1 commit intogithub:PiniShv/advisory-improvement-7384from
Open
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Changes
Two improvements to GHSA-rwvc-j5jr-mgvh (CVE-2025-48985), the Vercel AI SDK filetype whitelist bypass advisory:
1. CVSS 3.1 score update (AC:H to AC:L)
The current advisory uses the CNA-assigned CVSS vector with Attack Complexity: High (
AC:H), resulting in a base score of 3.7 (Low).NIST's independent analysis (NVD entry) assessed Attack Complexity as Low (
AC:L), resulting in a base score of 5.3 (Medium):This aligns better with the actual exploitation path. The vulnerability requires no race condition, no prior knowledge of internal state, and no man-in-the-middle positioning. An attacker simply sends a prompt containing a mix of supported and unsupported URLs, and the index misalignment occurs deterministically. There is nothing "high complexity" about the attack setup.
The
database_specific.severityfield has been updated fromLOWtoMODERATEaccordingly.2. Description enrichment
The current description is a single sentence that does not help users assess whether they are impacted. Using details published in Vercel's own official changelog and the fix commit, the description now includes:
generateText(),streamText())downloadedFilesandplannedDownloadsarrays inconvert-to-language-model-prompt.ts)No changes were made to the affected version ranges or references.