<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Vercel — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/vercel/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 18:13:52 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/vercel/feed.xml" rel="self" type="application/rss+xml"/><item><title>Inngest SDK Exposes Environment Variables via Unhandled HTTP Methods</title><link>https://feed.craftedsignal.io/briefs/2026-05-inngest-env-leak/</link><pubDate>Tue, 05 May 2026 18:13:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-inngest-env-leak/</guid><description>Inngest TypeScript SDK versions 3.22.0 through 3.53.1 expose environment variables via the serve() handler on unhandled HTTP methods, allowing unauthenticated remote attackers to exfiltrate environment variables from the host process via `PATCH`, `OPTIONS`, or `DELETE` requests to the `serve()` HTTP handler.</description><content:encoded><![CDATA[<p>A vulnerability exists in the Inngest TypeScript SDK versions 3.22.0 through 3.53.1. This flaw allows unauthenticated remote attackers to extract environment variables from the host process by sending <code>PATCH</code>, <code>OPTIONS</code>, or <code>DELETE</code> requests to the <code>serve()</code> HTTP handler. The vulnerability arises because these HTTP methods are not explicitly handled and fall through to a diagnostic handler that inadvertently exposes the contents of <code>process.env</code>. This exposure includes sensitive information such as secrets, API keys, and credentials. Applications are vulnerable if they use the affected SDK versions and their <code>serve()</code> endpoint is reachable via the aforementioned HTTP methods. The vulnerability was introduced in version 3.22.0 and fixed in 3.54.0. There are no known reports of active exploitation at this time.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Inngest application using a vulnerable SDK version (3.22.0 - 3.53.1).</li>
<li>The attacker determines the application&rsquo;s <code>serve()</code> endpoint URL.</li>
<li>The attacker sends an HTTP request to the <code>serve()</code> endpoint using the <code>PATCH</code>, <code>OPTIONS</code>, or <code>DELETE</code> method.</li>
<li>The Inngest SDK&rsquo;s <code>serve()</code> handler, lacking specific handling for these methods, falls through to a generic diagnostic handler.</li>
<li>The diagnostic handler inadvertently includes the contents of <code>process.env</code> in its response.</li>
<li>The attacker receives the HTTP response containing the application&rsquo;s environment variables.</li>
<li>The attacker extracts sensitive information from the environment variables, such as API keys or credentials.</li>
<li>The attacker uses the extracted credentials to gain unauthorized access to resources or perform malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to access sensitive environment variables. This can lead to the exposure of API keys, database credentials, and other secrets, potentially leading to unauthorized access to internal systems, data breaches, or other malicious activities. The number of affected applications depends on the adoption rate of the vulnerable Inngest SDK versions. Sectors utilizing Inngest for background job processing or event-driven architectures are particularly at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>inngest@3.54.0</code> or later to patch the vulnerability as mentioned in the overview.</li>
<li>Rotate any secrets that were present in environment variables (<code>process.env</code>) within affected environments, including Inngest signing keys and event keys, as described in the remediation steps in the advisory.</li>
<li>Search logs for any requests to your <code>serve</code> endpoints using the <code>PATCH</code>, <code>OPTIONS</code>, <code>DELETE</code> HTTP methods to assess if any environment variables may have been exposed, as described in the remediation steps in the advisory.</li>
<li>Adjust firewall or proxy rules to only allow requests to your <code>serve</code> endpoint from Inngest IP addresses available at <a href="http://inngest.com/ips-v4">http://inngest.com/ips-v4</a> and <a href="http://inngest.com/ips-v6">http://inngest.com/ips-v6</a>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>environment-variable-exposure</category><category>inngest</category><category>cve-2026-42047</category></item></channel></rss>