Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54313: CWE-506 Embedded Malicious Code in prettier eslint-config-prettier

0
High
VulnerabilityCVE-2025-54313cvecve-2025-54313cwe-506
Published: Sat Jul 19 2025 (07/19/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: prettier
Product: eslint-config-prettier

Description

eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious code for a supply chain compromise. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.

AI-Powered Analysis

AILast updated: 01/22/2026, 19:13:01 UTC

Technical Analysis

CVE-2025-54313 is a supply chain vulnerability classified under CWE-506 (Embedded Malicious Code) that affects the eslint-config-prettier package, a widely used configuration package for integrating Prettier with ESLint in JavaScript and TypeScript projects. The affected versions (8.10.1, 9.1.1, 10.1.6, and 10.1.7) contain malicious code embedded within the install.js script, which executes automatically during package installation. This script launches a malicious Windows DLL named node-gyp.dll, which is malware designed to compromise the host system. The attack vector requires no user interaction or privileges, as the malicious code runs as part of the normal package installation process, typically executed by developers or automated CI/CD pipelines. The CVSS 3.1 score of 7.5 reflects a high severity due to the potential for high integrity impact (codebase and environment compromise) and the scope being changed (the vulnerability affects multiple systems downstream of the compromised package). The vulnerability does not affect availability but can lead to unauthorized code execution and potential further exploitation within affected environments. No patches or fixes are currently linked, emphasizing the need for immediate manual mitigation steps. The absence of known exploits in the wild suggests this is a newly discovered issue, but the supply chain nature makes it particularly dangerous as it can silently propagate through development environments and production deployments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to software development integrity and security. Organizations relying on Node.js and JavaScript development stacks that include eslint-config-prettier are vulnerable to supply chain attacks that can lead to unauthorized code execution, insertion of backdoors, or further malware deployment. This can compromise source code integrity, leak sensitive intellectual property, and enable attackers to pivot within corporate networks. The impact is especially critical for sectors with high software development activity such as finance, telecommunications, and technology companies. Additionally, compromised CI/CD pipelines can lead to widespread distribution of malicious code into production environments, affecting availability and trust in software products. The stealthy nature of supply chain attacks complicates detection and remediation, increasing the risk of prolonged undetected compromise. European organizations with automated build and deployment systems are particularly at risk if they do not validate package integrity or monitor for anomalous behavior during package installation.

Mitigation Recommendations

1. Immediately audit all projects and build environments for usage of eslint-config-prettier versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7 and remove or replace them with unaffected versions. 2. Use package integrity verification tools such as npm audit, Snyk, or other software composition analysis tools to detect compromised packages. 3. Implement strict supply chain security practices including locking dependencies to known good versions using package-lock.json or yarn.lock files. 4. Employ reproducible builds and verify checksums of packages before installation. 5. Monitor CI/CD pipelines for unexpected network connections or execution of unknown binaries during package installation. 6. Restrict build environments to run with least privilege and isolate them to limit malware impact. 7. Engage with package maintainers and official repositories to track release of patched versions and apply updates promptly. 8. Educate developers and DevOps teams about supply chain risks and encourage vigilance when adding or updating dependencies. 9. Consider using tools that sandbox or analyze package installation scripts before deployment. 10. Maintain robust endpoint detection and response (EDR) solutions to detect and respond to malicious DLL execution on Windows hosts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-07-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687bcf55a83201eaacfe3cce

Added to database: 7/19/2025, 5:01:09 PM

Last enriched: 1/22/2026, 7:13:01 PM

Last updated: 2/7/2026, 3:09:02 PM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats