Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54313: CWE-506 Embedded Malicious Code in prettier eslint-config-prettier

0
High
VulnerabilityCVE-2025-54313cvecve-2025-54313cwe-506
Published: Sat Jul 19 2025 (07/19/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: prettier
Product: eslint-config-prettier

Description

eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious code for a supply chain compromise. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:38:14 UTC

Technical Analysis

CVE-2025-54313 is a supply chain vulnerability classified under CWE-506 (Embedded Malicious Code) that affects the eslint-config-prettier package versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7. eslint-config-prettier is a popular configuration package used to disable ESLint rules that conflict with Prettier formatting, widely adopted in JavaScript and TypeScript development. The malicious code is embedded within the package's installation script (install.js), which executes automatically upon installation. On Windows platforms, this script launches a malware payload named node-gyp.dll, which is likely a malicious dynamic link library designed to compromise system integrity. The attack vector requires no privileges or user interaction beyond installing the compromised package, making it a critical supply chain risk. The CVSS 3.1 score of 7.5 indicates a network attack vector with high impact on integrity and low impact on confidentiality, no impact on availability, and high attack complexity. The vulnerability's scope is broad given the widespread use of eslint-config-prettier in development environments globally. Although no active exploits have been reported, the presence of embedded malware in a trusted package poses significant risk to software supply chains and downstream consumers. The lack of available patches at the time of disclosure necessitates urgent remediation and monitoring.

Potential Impact

The primary impact of CVE-2025-54313 is the compromise of software supply chains through trusted development dependencies. Organizations that use the affected versions of eslint-config-prettier risk executing malicious code during package installation, potentially leading to unauthorized code execution and integrity breaches in development and build environments. This can result in the injection of backdoors, data tampering, or further malware deployment within corporate networks. The malware payload node-gyp.dll could facilitate persistence, lateral movement, or data exfiltration on Windows systems. Since eslint-config-prettier is commonly used in continuous integration and deployment pipelines, compromised build environments can propagate malicious code into production software, affecting end users and customers. The vulnerability can undermine trust in open-source ecosystems and cause significant operational disruption, intellectual property theft, and reputational damage. Although no availability impact is indicated, the integrity and confidentiality risks are substantial, especially for organizations with large JavaScript/TypeScript codebases and automated build processes.

Mitigation Recommendations

1. Immediately audit all development and CI/CD environments for installations of eslint-config-prettier versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7. 2. Remove or replace affected package versions with known clean versions once available; if no patched versions exist, temporarily remove eslint-config-prettier from the dependency tree or use alternative formatting configurations. 3. Conduct thorough endpoint and build environment scans for the presence of node-gyp.dll and other suspicious artifacts, especially on Windows systems. 4. Implement strict supply chain security measures such as verifying package integrity via checksums or signatures before installation. 5. Employ network segmentation and least privilege principles in build environments to limit malware impact. 6. Monitor for unusual network or process activity originating from development machines and build servers. 7. Educate developers and DevOps teams about supply chain risks and encourage use of tools that detect malicious package behavior. 8. Maintain up-to-date backups of critical build and source code repositories to enable recovery if compromise is detected. 9. Engage with package maintainers and security communities for updates and patches. 10. Consider adopting reproducible builds and dependency whitelisting to reduce exposure to malicious packages.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-07-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687bcf55a83201eaacfe3cce

Added to database: 7/19/2025, 5:01:09 PM

Last enriched: 2/27/2026, 3:38:14 AM

Last updated: 3/23/2026, 7:52:08 PM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses