Vercel Weathers Multiple Security Incidents Across 2025-2026, From npm Breaches to Middleware Bypasses
Vercel experienced multiple security incidents from 2025-2026, including npm supply chain attacks targeting DuckDB packages, a Next.js middleware bypass vulnerability, and unauthorized system access,

Vercel Weathers Multiple Security Incidents Across 2025-2026, From npm Breaches to Middleware Bypasses
The cloud deployment platform Vercel has navigated a series of security incidents spanning from late 2025 through early 2026, encompassing npm supply chain attacks, Next.js middleware vulnerabilities, and unauthorized system access. The timeline reveals both the complexity of modern web infrastructure security and the evolving response protocols for critical vulnerabilities in widely-deployed frameworks.
npm Supply Chain Attack Targets DuckDB Ecosystem
On September 8, 2025, Vercel published a detailed response to what it characterized as a "critical npm supply chain attack." The campaign, which extended to DuckDB-related packages on September 9, 2025, stemmed from a breach of the duckdb_admin account. Vercel documented the incident in real-time, providing visibility into how modern supply chain compromises propagate through package dependency networks.
The DuckDB targeting represents a notable evolution in npm-based attacks. DuckDB, an analytical database system gaining adoption in data engineering workflows, represents critical infrastructure for organizations processing analytical workloads. The breach of administrative credentials demonstrates how single points of failure in package management can cascade across entire ecosystems.
Next.js Middleware Vulnerability Timeline
A more protracted security incident emerged through Vercel's handling of a Next.js middleware bypass vulnerability. The vulnerability was initially disclosed to the Next.js team on February 27, 2025 at 06:03:00 GMT through GitHub's private vulnerability reporting mechanism. Vercel's postmortem details a response timeline that stretched over nearly a month.
The security team's formal response came on March 5, 2025 at 10:38:00 GMT — a six-day window that, while reasonable for complex framework vulnerabilities, highlights the coordination challenges in modern JavaScript ecosystems. The company subsequently published backports for multiple Next.js versions: Next.js 13.5.9 received its patch on March 22, 2025 at 21:21:00 GMT, followed by Next.js 12.3.5 on March 23, 2025 at 06:44:00 GMT.
The staggered release pattern reflects the practical challenges of maintaining security across multiple major versions of a framework deployed across millions of applications. Organizations running older Next.js versions faced a particularly complex upgrade path, as middleware bypasses can fundamentally compromise application security models.
Process Consolidation and Response Protocol Changes
Following the middleware incident, Vercel consolidated its vulnerability reporting channels. The company eliminated both security@vercel.com and responsible.disclosure@vercel.com, directing all Next.js security reports exclusively through GitHub's private vulnerability reporting system. This streamlining suggests lessons learned about communication overhead during critical incident response.
Analysis: The consolidation toward GitHub's native reporting mechanism reflects broader industry movement toward platform-integrated security workflows. However, this approach creates platform dependency that may complicate reporting for researchers who prefer email-based disclosure or operate under organizational policies restricting GitHub usage.
Broader Threat Landscape Context
The Vercel incidents occurred against a backdrop of intensified supply chain and application-layer attacks throughout 2025. The ShinyHunters group, active since 2019, expanded operations significantly during this period. The group claimed responsibility for Salesforce Aura/Experience Cloud data theft attacks, targeting companies with insecure guest user access control configurations beginning in September 2025.
ShinyHunters' parallel activities included launching a new iteration of BreachForums in 2023 after the previous infrastructure was compromised and its complete database and source code offered for sale at $10,000. The group's diversified attack portfolio — spanning everything from cloud platform misconfigurations to underground forum operations — illustrates the interconnected nature of modern cyber threat ecosystems.
Media organizations also faced targeted attacks during this period. Agence France-Presse detected an attack on its IT systems on a Friday, affecting portions of its client delivery service. AFP's press release confirmed the impact on news distribution infrastructure, highlighting how critical information services become high-value targets during periods of global instability.
April 2026 System Compromise
Vercel faced another significant incident in April 2026 involving unauthorized access to internal systems. While the company has published limited details in its security bulletin, the timing suggests ongoing sophisticated targeting of cloud infrastructure providers.
Worth flagging: The precise nature of the April 2026 incident remains unclear from public disclosures. Given Vercel's role as infrastructure for millions of applications, including many enterprise deployments, the scope and potential data exposure warrant careful monitoring by organizations dependent on the platform.
Compliance and Security Framework Updates
Throughout this period, Vercel maintained its Payment Card Industry Data Security Standard (PCI DSS) compliance posture, completing Self-Assessment Questionnaire Attestation of Compliance (SAQ-D AOC) certifications for Service Providers in both 2024 and 2025. The company also updated its subprocessor documentation specifically for AI product services, reflecting the expanding scope of third-party integrations in modern platform architectures.
One curious data point emerged regarding defensive investments: Vercel reportedly paid $1 million to security researchers for firewall hardening against something termed "React2Shell" — though this appears in sources of questionable reliability and lacks corroboration in official company communications.
Enterprise Impact and Response Considerations
For organizations running production workloads on Vercel's platform or utilizing Next.js in critical applications, this sequence of events illuminates several operational considerations. The middleware bypass vulnerability particularly affected applications relying on Next.js middleware for authentication, authorization, or request filtering — core security functions that, when bypassed, can expose entire application logic.
The npm supply chain attacks reinforce the importance of dependency scanning and software composition analysis in continuous integration pipelines. Organizations without visibility into their transitive dependencies — particularly those extending into analytical database tooling like DuckDB — faced potential blind spots during the September campaign.
In this author's view: The concentration of multiple security incidents around a single platform provider underscores the systemic risks inherent in cloud-native development patterns. While Vercel's transparent communication during these incidents represents industry best practice, the frequency suggests that organizations should evaluate their platform concentration risk and incident response dependencies.
The company's evolution toward GitHub-centric vulnerability reporting may streamline internal processes but creates new coordination challenges for enterprise security teams managing vulnerability intake across diverse toolchains. Security practitioners should validate that their current processes can accommodate platform-specific reporting requirements without introducing disclosure delays.
As cloud platforms mature into critical infrastructure roles, their security incidents increasingly function as systemic events affecting entire segments of the web application ecosystem. The Vercel timeline provides a useful case study in how these cascading effects manifest — and how both providers and consumers of platform services must adapt their security models accordingly.
