Information disclosure in Flags SDK (CVE-2025-46332)

2 min read

Vercel discovered and patched an information disclosure vulnerability in the Flags SDK, affecting versions:

  • flags ≤ 3.2.0

  • @vercel/flags ≤ 3.1.1

This is being tracked as CVE-2025-46332. We have published an automatic mitigation for the default configuration of the Flags SDK on Vercel.

We recommend upgrading to flags@4.0.0 (or migrating from @vercel/flags to flags) to remediate the issue. Further guidance can be found in the upgrade guide.

Impact and analysis

A malicious actor could determine the following under specific conditions:

  • Flag names

  • Flag descriptions

  • Available options and their labels (e.g. true, false)

  • Default flag values

Flags providers were not accessible. No write access nor additional customer data was exposed, this is limited to the values noted above.

Automatic mitigation

Vercel implemented a network-level mitigation to prevent the default flags discovery endpoint at /.well-known/vercel/flags being reachable, which automatically protects Vercel deployments against exploitation of this issue.

While uncommon, if you are exposing the flags discovery endpoint through custom paths, you can also implement a custom WAF rule to restrict access to these endpoints as a mitigation, for example when using:

  • Pages Router, as the original non-rewritten route would still be accessible, e.g. /api/vercel/flags

  • Microfrontends, as each application may use a distinct flags discovery endpoint

Recommendations

We recommend that all users upgrade to flags@4.0.0. Flags Explorer will be disabled and show a warning notice until you upgrade to the latest version.

More information can be found in the upgrade guide.