Vercel, the cloud infrastructure provider behind the Next.js framework, officially disclosed a security breach on April 20, 2026, following the compromise of a third-party AI productivity tool. The incident allowed unauthorized actors to gain access to internal Vercel environments and exfiltrate non-sensitive environment variables belonging to a limited subset of the platform's customers. The breach originated from a security failure at Context.ai, an agentic AI platform used by a Vercel employee. According to Vercel’s security bulletin, attackers compromised Context.ai’s Google Workspace OAuth application, which granted them inherited access to the Vercel employee’s enterprise account. This initial foothold enabled the threat actor to bypass internal security perimeters and move laterally into Vercel’s internal management systems.

Vercel CEO Guillermo Rauch stated that the company’s Sensitive Environment Variables remained secure throughout the intrusion. These high-security secrets are stored in a hardware-encrypted vault and were not accessible through the internal administrative endpoints reached by the attackers. However, environment variables not explicitly marked as sensitive—such as public API endpoints and deployment metadata—were enumerated and potentially exfiltrated. Vercel has not yet released the exact number of affected users but confirmed that all impacted parties have been notified and advised to rotate their credentials immediately.

The threat intelligence firm Hudson Rock identified a potential root cause, noting that a Context.ai employee was infected with Lumma Stealer malware in February 2026. This infection likely facilitated the initial theft of the OAuth tokens used in the subsequent supply chain escalation. A threat actor operating under the pseudonym ShinyHunters has claimed responsibility for the attack, purportedly offering the stolen data for sale on underground forums for 2 million dollars.

Vercel’s security operations team detected the unauthorized activity on April 19, 2026, and moved to revoke the compromised OAuth tokens and rotate internal service credentials. The company has engaged Google-owned Mandiant to conduct a comprehensive forensic audit and has notified law enforcement. While Vercel’s core services and the Vercel Edge Network remained operational during the incident, the company has implemented a temporary suspension of third-party AI integrations across its corporate network.

In official statements, Vercel described the attackers as highly sophisticated due to their operational velocity and deep understanding of the platform's internal architecture. The company plans to release a detailed technical post-mortem and has urged all customers to review their activity logs and ensure that all sensitive data is correctly classified within the Vercel dashboard to prevent future exposure.