Vercel April 2026 security incident
- Vates - 942 sekunder sedanWhen one OAuth token can compromise dev tools, CI pipeline, secrets and deployment simultaneously, something architectural has gone wrong. Vercel have had React2Shell (CVSS 10), the middleware bypass (CVSS 9.1), and now this, all within 12 months.
At what point do we start asking questions about the concentration of trust in the web ecosystem?
It's funny that at the engineering level we are continuously grilled in interviews about the single responsibility principle, meanwhile the industry's business model is to undermine the entirety of web standards and consolidate the web stack into a CLI.
- nettlin - 23812 sekunder sedanThey just added more details:
> Indicators of compromise (IOCs)
> Our investigation has revealed that the incident originated from a third-party AI tool whose Google Workspace OAuth app was the subject of a broader compromise, potentially affecting hundreds of its users across many organizations.
> We are publishing the following IOC to support the wider community in the investigation and vetting of potential malicious activity in their environments. We recommend that Google Workspace Administrators and Google Account owners check for usage of this app immediately.
> OAuth App: 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com
https://vercel.com/kb/bulletin/vercel-april-2026-security-in...
- nikcub - 29301 sekunder sedanClaude Code defaulting to a certain set of recommended providers[0] and frameworks is making the web more homogenous and that lack of diversity is increasing the blast radius of incidents
- toddmorey - 32956 sekunder sedanI've been part of a response team on a security incident and I really feel for them. However, this initial communication is terrible.
Something happened, we won't say what, but it was severe enough to notify law enforcement. What floors me is the only actionable advice is to "review environment variables". What should a customer even do with that advice? Make sure the variable are still there? How would you know if any of them were exposed or leaked?
The advice should be to IMMEDIATELY rotate all passwords, access tokens, and any sensitive information shared with Vercel. And then begin to audit access logs, customer data, etc, for unusual activity.
The only reason to dramatically overpay for the hosting resources they provide is because you expect them to expertly manage security and stability.
I know there is a huge fog of uncertainly in the early stages of an incident, but it spooks me how intentionally vague they seem to be here about what happened and who has been impacted.
- nettlin - 23798 sekunder sedanThey just added more details:
> Indicators of compromise (IOCs)
> Our investigation has revealed that the incident originated from a third-party AI tool whose Google Workspace OAuth app was the subject of a broader compromise, potentially affecting hundreds of its users across many organizations.
> We are publishing the following IOC to support the wider community in the investigation and vetting of potential malicious activity in their environments. We recommend that Google Workspace Administrators and Google Account owners check for usage of this app immediately.
> OAuth App: 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com
https://vercel.com/kb/bulletin/vercel-april-2026-security-in...
- _jab - 26035 sekunder sedan> Vercel did not specify which of its systems were compromised
I’m no security engineer, but this is flatly unacceptable, right? This feels like Vercel is covering its own ass in favor of helping its customers understand the impact of this incident.
- jtreminio - 39192 sekunder sedanI'm on a macbook pro, Google Chrome 147.0.7727.56.
Clicking the Vercel logo at the top left of the page hard crashes my Chrome app. Like, immediate crash.
What an interesting bug.
- MattIPv4 - 40485 sekunder sedanRelated: https://news.ycombinator.com/item?id=47824426
https://x.com/theo/status/2045862972342313374
> I have reason to believe this is credible.
https://x.com/theo/status/2045870216555499636
> Env vars marked as sensitive are safe. Ones NOT marked as sensitive should be rolled out of precaution
https://x.com/theo/status/2045871215705747965
> Everything I know about this hack suggests it could happen to any host
https://x.com/DiffeKey/status/2045813085408051670
> Vercel has reportedly been breached by ShinyHunters.
- - 1487 sekunder sedan
- nike-17 - 32856 sekunder sedanIncidents like this are a good reminder of how concentrated our single points of failure have become in the modern web ecosystem. I appreciate the transparency in their disclosure so far, but it definitely makes you re-evaluate the risk profile of leaning entirely on fully managed PaaS solutions.
- swingboy - 33171 sekunder sedanIs this one of those situations where _a lot_ of customers are affected and the “subset” are just the bigger ones they can’t afford to lose?
- Izmaki - 23896 sekunder sedanA "limited subset of customers" could be 99% of them and the phrase would still be technically true.
- OsrsNeedsf2P - 40535 sekunder sedanThe lack of details makes me wonder how large this "subset" of users really is
- landl0rd - 25861 sekunder sedanWow, maybe Cloudflare can help them secure their systems? I hear they have a pretty good WAF.
- rrmdp - 17666 sekunder sedanUse VPS, nowadays with the help of AI it's a lot easier to set everything up, you don't need Versel at all. And of course way cheaper
- jtokoph - 32366 sekunder sedanThis announcement in its current form is quite useless and not actionable. As least people won’t be able to say “why didn’t you say something sooner?” They said _something_
- zuzululu - 31656 sekunder sedanWhat is the rationale for using vercel ? I'm getting a lot of value out of cloudflare with the $5/month plan lately but my bare metal box with triple digit ram has seen zero downtime since 2015.
- adithyasrin - 36707 sekunder sedanThe original link posted in the post has almost same content: https://vercel.com/kb/bulletin/vercel-april-2026-security-in...
- arabsson - 31876 sekunder sedanSo, the Vercel post says a number of customers were impacted, but not everyone, and they will contact the people that were impacted. I wasn't contacted so does that mean I'm safe?
- adithyasrin - 36605 sekunder sedanWe run on Vercel and I wonder if / how long before we're alerted about a leak. Quick look online suggests environment variables marked as sensitive are ok, but to which extent I wonder.
- leetrout - 26568 sekunder sedanPorter also had a breach recently. I assume it is as tightly scoped as they say to not have publicized it.
- jngiam1 - 12072 sekunder sedanI don't get why everything is not marked as sensitive in env vars by default instead.
- neom - 39475 sekunder sedanhttps://x.com/theo/status/2045871215705747965 - "Everything I know about this hack suggests it could happen to any host"
He also suggests in another post that Linear and GitHub could also be pwned?
Either way, hugops to all the SRE/DevOps out there, seems like it's going to be a busy Sunday for many.
- philip1209 - 22512 sekunder sedanWe proactively rotated keys. Even if you haven’t received an official email, expect customers to inquire about this tomorrow morning.
- oxag3n - 23816 sekunder sedan> incident response provider
So they use third-party for incident management? They are de-risking by spending more, which is a loose-loose for the customers.
- james-clef - 19845 sekunder sedanThe point I am taking away here is to never use Vercel's environment variables to store secrets.
- eieiyo - 26397 sekunder sedan
- gneray - 38808 sekunder sedan
- ebbi - 22184 sekunder sedanAhhh...another product I'm boycotting, and now doubly glad I'm boycotting.
- ofabioroma - 39538 sekunder sedanTime to ipo
- monirmamoun - 20917 sekunder sedanWell when the CEO of Vercel poses with Netanyahu, a war criminal, in the middle of a genocide... it's going to imply that Vercel has valuable war crime data that people will want to intercept just to bring down Israel's genocidal program.
- jamesfisher - 21398 sekunder sedanReminder the Vercel CEO is a genocide supporter, if you need more reasons to move away from it.
- tamimio - 1985 sekunder sedanAnother win for self-hosters, I host my own vercel (coolify) and it works well, all under my control and only expose what I want.
- OsamaJaber - 25929 sekunder sedanThat's why infra needs stricter internal walls than normal SaaS
- _puk - 31480 sekunder sedanHmmm, the dashboard 404 I got 6 hours ago now makes a bit more sense..
- jheitzeb - 30694 sekunder sedanMissing from Glasswing
- nothinkjustai - 31362 sekunder sedanLooks like their rampant vibe coding is starting to catch up to them. Expect to see many pre vulns like this in the future.
- 0xy - 38649 sekunder sedanThis is why you pay a real provider for serious business needs, not an AWS reseller. Next.js is a fundamentally insecure framework, as server components are an anti-pattern full of magic leading to stuff like the below. Given their standards for framework security, it's not hard to believe their business' control plane is just as insecure (and probably built using the same insecure framework).
Next.js is the new PHP, but worse, since unlike PHP you don't really know what's server side and what's client side anymore. It's all just commingled and handled magically.
https://aws.amazon.com/security/security-bulletins/rss/aws-2...
- raw_anon_1111 - 20926 sekunder sedanWhy does anyone running a third party tool have access to all of their clients’ accounts? I can’t imagine something this stupid happening with a real service provider.
I see Vercel is hosted on AWS? Are they hosting every one on a single AWS account with no tenant isolating? Something this dumb could never happen on a real AWS account. Yes I know the internal controls that AWS has (former employee).
Anyone who is hosting a real business on Vercel should have known better.
I have used v0 to build a few admin sites. But I downloaded the artifacts, put in a Docker container and hosted everything in Lambda myself where I controlled the tenant isolation via separate AWS accounts, secrets in Secret Manager and tightly scoped IAM roles, etc.
- jimmydoe - 27467 sekunder sedanwhat's the cause of the breach?
- - 40565 sekunder sedan
- rvz - 38930 sekunder sedanThere is no serious reason to use Vercel, other than for those being locked into the NextJs ecosystem and demo projects.
- ItsClo688 - 3282 sekunder sedan[dead]
- victor9000 - 12731 sekunder sedan[dead]
- renan_warmling - 21929 sekunder sedan[dead]
- nryoo - 33148 sekunder sedan[dead]
- Yash16 - 15313 sekunder sedan[dead]
- jccx70 - 39680 sekunder sedan[dead]
- ArcherL - 29802 sekunder sedan[dead]
- sreekanth850 - 35342 sekunder sedan[flagged]
- ksajadi - 29828 sekunder sedan[flagged]
- hansmayer - 20494 sekunder sedan[flagged]
- - 33178 sekunder sedan
- mikert89 - 38197 sekunder sedanMuch as I want to rip on vercel, its clear that ai is going to lead to mass security breaches. The attack surface is so large, and ai agents are working around the clock. This is a new normal. Open source software is going to change, companies wont be running random repos off github anymore
Nördnytt! 🤓