CVE-2025-10894: Embedded Malicious Code
Malicious code was inserted into the Nx (build system) package and several related plugins. The tampered package was published to the npm software registry, via a supply-chain attack. Affected versions contain code that scans the file system, collects credentials, and posts them to GitHub as a repo under user's accounts.
AI Analysis
Technical Summary
CVE-2025-10894 represents a severe supply-chain attack targeting the Nx build system package and several associated plugins distributed via the npm registry. Attackers successfully inserted malicious code into specific versions of these packages (notably versions 20.9.0 through 21.8.0), which were then published and made available to developers worldwide. Upon installation or update, the malicious payload activates by scanning the local file system to locate sensitive credentials, including but not limited to environment variables, configuration files, and potentially stored authentication tokens. The harvested credentials are then exfiltrated by automatically creating repositories under the victim's GitHub accounts and pushing the stolen data there, effectively bypassing traditional network monitoring and data loss prevention controls. This attack exploits the trust developers place in widely used open-source packages, leveraging the npm ecosystem's central role in modern JavaScript and TypeScript development. The vulnerability does not require prior authentication but does require user interaction to install or update the compromised package. The CVSS 3.1 score of 9.6 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) indicates network exploitable, low attack complexity, no privileges required, user interaction needed, scope changed, and high impact on confidentiality, integrity, and availability. No patches or mitigations are currently linked in the provided data, emphasizing the urgency for maintainers and users to audit dependencies and monitor for suspicious GitHub activity. Although no known exploits in the wild are reported yet, the nature of the attack and the widespread use of Nx make this a critical threat to software supply chains.
Potential Impact
The impact of CVE-2025-10894 is profound for organizations relying on the Nx build system in their development pipelines. Successful exploitation results in the compromise of sensitive credentials, which can include API keys, personal access tokens, and other secrets stored locally. These credentials being posted to attacker-controlled GitHub repositories enable further attacks such as unauthorized access to cloud services, code repositories, and internal systems. This can lead to intellectual property theft, insertion of backdoors, disruption of development workflows, and broader network compromise. The attack undermines trust in the software supply chain, potentially affecting continuous integration and deployment processes. Organizations may face operational downtime, data breaches, regulatory penalties, and reputational damage. The ease of exploitation and the criticality of the affected components amplify the risk, especially for enterprises with large development teams and automated build environments.
Mitigation Recommendations
To mitigate CVE-2025-10894, organizations should immediately audit their use of Nx packages and related plugins to identify installations of affected versions (20.9.0 through 21.8.0). Until official patches are released, consider rolling back to earlier, unaffected versions or temporarily removing Nx from build pipelines. Implement strict dependency management policies including the use of package integrity verification tools such as npm audit, Snyk, or OSS Index to detect tampered packages. Employ network monitoring to detect unusual outbound GitHub repository creation or data exfiltration attempts. Enforce the principle of least privilege for credentials stored on developer machines and CI/CD environments to limit the scope of compromised secrets. Rotate all potentially exposed credentials immediately if compromise is suspected. Educate developers about the risks of supply-chain attacks and encourage the use of signed packages and verified publishers. Finally, maintain close communication with Nx maintainers and npm security advisories for timely patch releases and updates.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, India, Netherlands, South Korea, China, Brazil
CVE-2025-10894: Embedded Malicious Code
Description
Malicious code was inserted into the Nx (build system) package and several related plugins. The tampered package was published to the npm software registry, via a supply-chain attack. Affected versions contain code that scans the file system, collects credentials, and posts them to GitHub as a repo under user's accounts.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10894 represents a severe supply-chain attack targeting the Nx build system package and several associated plugins distributed via the npm registry. Attackers successfully inserted malicious code into specific versions of these packages (notably versions 20.9.0 through 21.8.0), which were then published and made available to developers worldwide. Upon installation or update, the malicious payload activates by scanning the local file system to locate sensitive credentials, including but not limited to environment variables, configuration files, and potentially stored authentication tokens. The harvested credentials are then exfiltrated by automatically creating repositories under the victim's GitHub accounts and pushing the stolen data there, effectively bypassing traditional network monitoring and data loss prevention controls. This attack exploits the trust developers place in widely used open-source packages, leveraging the npm ecosystem's central role in modern JavaScript and TypeScript development. The vulnerability does not require prior authentication but does require user interaction to install or update the compromised package. The CVSS 3.1 score of 9.6 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) indicates network exploitable, low attack complexity, no privileges required, user interaction needed, scope changed, and high impact on confidentiality, integrity, and availability. No patches or mitigations are currently linked in the provided data, emphasizing the urgency for maintainers and users to audit dependencies and monitor for suspicious GitHub activity. Although no known exploits in the wild are reported yet, the nature of the attack and the widespread use of Nx make this a critical threat to software supply chains.
Potential Impact
The impact of CVE-2025-10894 is profound for organizations relying on the Nx build system in their development pipelines. Successful exploitation results in the compromise of sensitive credentials, which can include API keys, personal access tokens, and other secrets stored locally. These credentials being posted to attacker-controlled GitHub repositories enable further attacks such as unauthorized access to cloud services, code repositories, and internal systems. This can lead to intellectual property theft, insertion of backdoors, disruption of development workflows, and broader network compromise. The attack undermines trust in the software supply chain, potentially affecting continuous integration and deployment processes. Organizations may face operational downtime, data breaches, regulatory penalties, and reputational damage. The ease of exploitation and the criticality of the affected components amplify the risk, especially for enterprises with large development teams and automated build environments.
Mitigation Recommendations
To mitigate CVE-2025-10894, organizations should immediately audit their use of Nx packages and related plugins to identify installations of affected versions (20.9.0 through 21.8.0). Until official patches are released, consider rolling back to earlier, unaffected versions or temporarily removing Nx from build pipelines. Implement strict dependency management policies including the use of package integrity verification tools such as npm audit, Snyk, or OSS Index to detect tampered packages. Employ network monitoring to detect unusual outbound GitHub repository creation or data exfiltration attempts. Enforce the principle of least privilege for credentials stored on developer machines and CI/CD environments to limit the scope of compromised secrets. Rotate all potentially exposed credentials immediately if compromise is suspected. Educate developers about the risks of supply-chain attacks and encourage the use of signed packages and verified publishers. Finally, maintain close communication with Nx maintainers and npm security advisories for timely patch releases and updates.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-09-23T16:30:03.636Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d487f92f6beace9efc3566
Added to database: 9/25/2025, 12:08:25 AM
Last enriched: 2/27/2026, 6:42:19 PM
Last updated: 3/22/2026, 10:13:16 PM
Views: 184
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.