7 Bugs, 7 Hours: The Vercel vs Vinext Security Drama Explained
Act 1: Cloudflare Drops Vinext
One engineer. One AI. One week. $1,100 in tokens.
On February 26, Cloudflare open-sourced Vinext — a Vite-powered drop-in replacement for the Next.js API surface. Not a toy. Not a demo. A framework already deployed on CIO.gov, with numbers that made the React ecosystem take notice:
The README is upfront: Vinext is experimental. It says so in bold. The project invites contributions, bug reports, security disclosures — the whole open-source playbook.
Act 2: Vercel's CEO Fires Back
Within hours — not days, not weeks — hours — Guillermo Rauch, CEO of Vercel, posted this:
At the same time, Vercel published a "Migrate to Vercel from Cloudflare" page.
Let that sink in. A CEO publicly disclosed vulnerabilities in an experimental open-source competitor — and launched a marketing campaign on the same tweet.
Act 3: The Timeline
Act 4: The Receipts
Security researcher Sam Curry dropped the mic:
Read that again. The vulnerability class Vercel "found" in Vinext? They already knew about it because someone reported the same bug in their own framework.
And speaking of Next.js vulnerabilities — here's what Vercel has shipped to production in the past two years:
create-next-app was exploitable. State actors exploited it within hours.
Act 5: What Developers Said
Act 6: How This Should Have Played Out
There are well-established, elegant ways for companies to help open-source competitors fix security issues. Vercel ignored all of them.
Act 7: Why It Actually Matters
This isn't just drama. It's about the future of the web framework ecosystem.
Next.js has a structural problem: it's tightly coupled to Vercel's infrastructure. Deploying on Cloudflare, AWS, or self-hosted has always been painful. That's not accidental — it's the business model. Vercel makes money when Next.js is hard to deploy elsewhere.
Vinext breaks that lock-in. A vendor-neutral, Vite-based implementation that deploys anywhere — including on Vercel itself. That's not a security threat. It's a business threat.
The Lock-In
Next.js works best on Vercel. Always has. Deploying elsewhere means missing features, slower builds, broken edge functions. That's by design.
The Threat
Vinext reimplements the API on Vite. Deploy anywhere. No vendor lock-in. A PoC already runs on Vercel itself. That's an existential problem for the business model.
The Response
Not a GitHub issue. Not a PR. Not a private email. A CEO tweet with a vulnerability count and a migration page. The message is clear: fear, not help.
The Bottom Line
Every open-source project ships with bugs. That's the deal. You open the code, people find issues, you fix them together. That's how it works.
But weaponising vulnerability disclosures — against an experimental project, within hours, alongside a marketing push — that's not security. That's sabotage with a press release.
Next.js shipped a CVSS 10.0 RCE that was exploited by nation-state actors. Vinext is one week old and labelled experimental. The question isn't whether Vinext has bugs. The question is why the CEO of Vercel chose to make it a spectacle instead of opening a pull request.
Related: Vercel's CEO Disclosed Vinext Bugs Within Hours · Cloudflare vs Vercel — The Full Breakdown · Cloudflare Has Won Every Battle It Picked