How to hack Discord, Vercel and more with one easy trick

Docs startup blunder puts big brands at risk; crowd roasts $5k bounty

TLDR: A docs platform used by major brands allegedly let user pages run server code and trigger link-based popups, sparking panic over supply-chain risk. Commenters torched the reported $5k bounty and asked why giants trusted a flashy startup, turning bug economics and vendor due diligence into the main event.

A researcher says a trendy documentation platform used by big names like Discord and Vercel let user-written pages secretly run code on its servers—think “one weird trick” and suddenly you’ve got access to secrets and can mess with caches across customer sites. They also showed a link that could grab images from other companies’ docs and pop an alert on Discord’s domain—pure internet nightmare fuel. The comments? Absolute fireworks. One user called it a VC‑funded, vibe‑coded AI docs startup moment: flashy features, short on brakes, and the finder allegedly got $5k for reporting it. Others piled on that $5k is peanuts for a vuln this spicy. Confusion swirled over why so many giant brands leaned on what looks like a “static site host with sprinkles,” while a wave of supply‑chain panic tied this to a related thread about pwning multiple platforms (link). The meme machine went into overdrive, mocking last week’s “impressively complicated” caching post—now the punchline. There’s some pushback that bug bounties vary and startups aren’t banks, but the loudest chorus is simple: if your docs can run code, your brand can get cooked. Grab popcorn; the docs are spicy.

Key Points

  • Researcher achieved server-side RCE on Mintlify by injecting JSX in MDX, confirmed via requests from Vercel/Amazon IPs (CVE-2025-67843).
  • Exfiltration of environment variables and app files from Mintlify’s Next.js serverless environment demonstrated broad access and token exposure.
  • The RCE enabled poisoning of Next.js cache across hosted sites, facilitating mass XSS, defacement, and fake cached pages.
  • A static asset route /_mintlify/static/[subdomain]/{...path} allowed cross-tenant asset access, enabling one-click XSS via crafted SVG (CVE-2025-67842).
  • Demonstrations included a crafted URL on discord.com loading an attacker-controlled SVG that executed JavaScript, proving practical impact.

Hottest takes

"VC-funded vibe-coded AI docs startup ships a mega vuln and the finder gets $5k" — llmslave2
"$5k is such a small payout for this sort of finding" — sans_souse
"How did a static docs host snag so many big-name logos?" — ollybee
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.