Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10894: Embedded Malicious Code

0
Critical
VulnerabilityCVE-2025-10894cvecve-2025-10894
Published: Wed Sep 24 2025 (09/24/2025, 21:20:31 UTC)
Source: CVE Database V5

Description

Malicious code was inserted into the Nx (build system) package and several related plugins. The tampered package was published to the npm software registry, via a supply-chain attack. Affected versions contain code that scans the file system, collects credentials, and posts them to GitHub as a repo under user's accounts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:42:19 UTC

Technical Analysis

CVE-2025-10894 represents a severe supply-chain attack targeting the Nx build system package and several associated plugins distributed via the npm registry. Attackers successfully inserted malicious code into specific versions of these packages (notably versions 20.9.0 through 21.8.0), which were then published and made available to developers worldwide. Upon installation or update, the malicious payload activates by scanning the local file system to locate sensitive credentials, including but not limited to environment variables, configuration files, and potentially stored authentication tokens. The harvested credentials are then exfiltrated by automatically creating repositories under the victim's GitHub accounts and pushing the stolen data there, effectively bypassing traditional network monitoring and data loss prevention controls. This attack exploits the trust developers place in widely used open-source packages, leveraging the npm ecosystem's central role in modern JavaScript and TypeScript development. The vulnerability does not require prior authentication but does require user interaction to install or update the compromised package. The CVSS 3.1 score of 9.6 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) indicates network exploitable, low attack complexity, no privileges required, user interaction needed, scope changed, and high impact on confidentiality, integrity, and availability. No patches or mitigations are currently linked in the provided data, emphasizing the urgency for maintainers and users to audit dependencies and monitor for suspicious GitHub activity. Although no known exploits in the wild are reported yet, the nature of the attack and the widespread use of Nx make this a critical threat to software supply chains.

Potential Impact

The impact of CVE-2025-10894 is profound for organizations relying on the Nx build system in their development pipelines. Successful exploitation results in the compromise of sensitive credentials, which can include API keys, personal access tokens, and other secrets stored locally. These credentials being posted to attacker-controlled GitHub repositories enable further attacks such as unauthorized access to cloud services, code repositories, and internal systems. This can lead to intellectual property theft, insertion of backdoors, disruption of development workflows, and broader network compromise. The attack undermines trust in the software supply chain, potentially affecting continuous integration and deployment processes. Organizations may face operational downtime, data breaches, regulatory penalties, and reputational damage. The ease of exploitation and the criticality of the affected components amplify the risk, especially for enterprises with large development teams and automated build environments.

Mitigation Recommendations

To mitigate CVE-2025-10894, organizations should immediately audit their use of Nx packages and related plugins to identify installations of affected versions (20.9.0 through 21.8.0). Until official patches are released, consider rolling back to earlier, unaffected versions or temporarily removing Nx from build pipelines. Implement strict dependency management policies including the use of package integrity verification tools such as npm audit, Snyk, or OSS Index to detect tampered packages. Employ network monitoring to detect unusual outbound GitHub repository creation or data exfiltration attempts. Enforce the principle of least privilege for credentials stored on developer machines and CI/CD environments to limit the scope of compromised secrets. Rotate all potentially exposed credentials immediately if compromise is suspected. Educate developers about the risks of supply-chain attacks and encourage the use of signed packages and verified publishers. Finally, maintain close communication with Nx maintainers and npm security advisories for timely patch releases and updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-09-23T16:30:03.636Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d487f92f6beace9efc3566

Added to database: 9/25/2025, 12:08:25 AM

Last enriched: 2/27/2026, 6:42:19 PM

Last updated: 3/22/2026, 10:13:16 PM

Views: 184

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses