Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59037: CWE-506: Embedded Malicious Code in duckdb duckdb-node

0
High
VulnerabilityCVE-2025-59037cvecve-2025-59037cwe-506
Published: Tue Sep 09 2025 (09/09/2025, 20:26:57 UTC)
Source: CVE Database V5
Vendor/Project: duckdb
Product: duckdb-node

Description

DuckDB is an analytical in-process SQL database management system. On 08 September 2025, the DuckDB distribution for Node.js on npm was compromised with malware (along with several other packages). An attacker published new versions of four of DuckDB's packages that included malicious code to interfere with cryptocoin transactions* According to the npm statistics, nobody has downloaded these packages before they were deprecated. The packages and versions `@duckdb/node-api@1.3.3`, `@duckdb/node-bindings@1.3.3`, `duckdb@1.3.3`, and `@duckdb/duckdb-wasm@1.29.2` were affected. DuckDB immediately deprecated the specific versions, engaged npm support to delete the affected verions, and re-released the node packages with higher version numbers (1.3.4/1.30.0). Users may upgrade to versions 1.3.4, 1.30.0, or a higher version to protect themselves. As a workaround, they may also downgrade to 1.3.2 or 1.29.1.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:03:29 UTC

Technical Analysis

CVE-2025-59037 is a high-severity vulnerability affecting specific versions of the DuckDB Node.js packages, namely @duckdb/node-api@1.3.3, @duckdb/node-bindings@1.3.3, duckdb@1.3.3, and @duckdb/duckdb-wasm@1.29.2. DuckDB is an in-process analytical SQL database management system widely used for data analytics and embedded database solutions. On September 8, 2025, these particular versions were compromised by an attacker who published malicious code embedded within the packages distributed via the npm repository. The malicious payload was designed to interfere with cryptocoin transactions, potentially enabling theft or manipulation of cryptocurrency assets. The attack vector involved supply chain compromise, where legitimate packages were replaced or updated with malicious versions. Fortunately, npm statistics indicate that these compromised versions were not downloaded before being deprecated, limiting exposure. DuckDB responded promptly by deprecating the affected versions, collaborating with npm to remove them, and releasing patched versions (1.3.4 and 1.30.0) that do not contain the malicious code. Users are advised to upgrade to these patched versions or alternatively downgrade to the last known clean versions (1.3.2 or 1.29.1) as a temporary mitigation. The CVSS 4.0 score of 8.6 reflects the high impact on confidentiality, integrity, and availability, with no privileges or authentication required for exploitation, though user interaction is necessary. This vulnerability falls under CWE-506, which relates to embedded malicious code, highlighting the risk of supply chain attacks in software dependencies.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on DuckDB Node.js packages in their data analytics pipelines, financial applications, or any systems handling cryptocurrency transactions. The embedded malicious code targeting cryptocoin transactions could lead to financial losses, data integrity issues, and erosion of trust in software supply chains. Organizations involved in fintech, cryptocurrency trading, blockchain analytics, or financial services are particularly at risk. Additionally, the compromise of analytical databases could disrupt business intelligence operations, leading to downtime and operational inefficiencies. Given the supply chain nature of the attack, even organizations with strong perimeter defenses could be affected if they consume these compromised packages. The fact that exploitation requires user interaction (e.g., installing or updating the affected packages) means that internal development or DevOps teams could inadvertently introduce the threat into production environments. The high CVSS score underscores the potential for severe confidentiality breaches and system integrity violations, which could cascade into regulatory compliance issues under GDPR and other European data protection laws.

Mitigation Recommendations

European organizations should take immediate and specific actions beyond generic patching advice: 1) Conduct an inventory of all projects and environments using DuckDB Node.js packages to identify any usage of the affected versions (1.3.3 and 1.29.2). 2) Upgrade all instances to the patched versions 1.3.4 or 1.30.0 as soon as possible. If immediate upgrading is not feasible, downgrade to the last known clean versions (1.3.2 or 1.29.1) temporarily. 3) Implement strict supply chain security practices, including verifying package integrity via checksums or signatures before deployment. 4) Employ automated dependency scanning tools integrated into CI/CD pipelines to detect usage of vulnerable package versions. 5) Educate development and DevOps teams about the risks of supply chain attacks and enforce policies restricting installation of unvetted packages. 6) Monitor network and application logs for unusual activity related to cryptocurrency transactions or database anomalies that could indicate exploitation attempts. 7) Collaborate with npm and other package repository providers to stay informed about future supply chain threats and removals. 8) Review and enhance incident response plans to include supply chain compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-08T16:19:26.171Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c08ee596774cc5680167bd

Added to database: 9/9/2025, 8:32:37 PM

Last enriched: 9/17/2025, 1:03:29 AM

Last updated: 10/30/2025, 6:32:15 PM

Views: 262

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats