๐Ÿ”“ Adobe Firefly CORS Misconfiguration โ€” Live PoC

Researcher: lucasfutures (HackerOne) • Program: Adobe BBP • Date: 2026-04-15 • Test origin:

Vulnerability: firefly.adobe.io and related Firefly AI hosts reflect any Origin header as Access-Control-Allow-Origin with Access-Control-Allow-Credentials: true. Any web page on any origin can make authenticated cross-origin requests to Firefly AI APIs using a victim's logged-in credentials and read the full response.

1 ยท Instant proof (runs automatically on page load)

The JavaScript below fetches 7 Firefly AI endpoints cross-origin. Each crossOriginReadSucceeded: true row means the browser allowed this attacker-origin page to read the response โ€” which is only possible if Adobe's server explicitly returns permissive CORS headers.

2 ยท Why this is exploitable

  1. Victim is authenticated to stock.adobe.com, firefly.adobe.com, or any other Adobe site that uses Firefly backends (IMS session cookie in their browser)
  2. Victim visits attacker-controlled site () via phishing or malvertising
  3. Attacker page calls fetch('https://firefly.adobe.io/...', {credentials:'include'})
  4. Browser sends victim's Adobe cookies (IMS session) with the request
  5. Adobe's server processes the authenticated request AND returns Access-Control-Allow-Origin: <attacker origin> + Allow-Credentials: true
  6. Attacker page reads the authenticated response body — AI generation history, stored prompts, rendition URLs, generative credit consumption, and all exposed headers

3 ยท Proof that CORS reflects arbitrary origins

$ curl -sI -X OPTIONS 'https://firefly.adobe.io/v2/images/generate' \
    -H 'Origin: https://lucas-hackerone.com' \
    -H 'Access-Control-Request-Method: POST'

HTTP/2 200
access-control-allow-origin: https://lucas-hackerone.com
access-control-allow-credentials: true
access-control-allow-methods: GET,HEAD,OPTIONS
access-control-allow-headers: x-api-key,authorization,content-type
access-control-max-age: 86400
access-control-expose-headers: *

4 ยท Affected endpoints (verified)

HostPathCORS reflected?
firefly.adobe.io/v2/images/generateโœ… Yes
firefly.adobe.io/v2/images/fillโœ… Yes
firefly.adobe.io/v2/storage/imageโœ… Yes
firefly.adobe.io/splโœ… Yes
firefly-clio-imaging.adobe.io/v2/images/generateโœ… Yes
firefly-st.adobe.io/splโœ… Yes
firefly-ae.adobe.io/splโœ… Yes

5 ยท Impact