CVE-2025-59037: CWE-506: Embedded Malicious Code in duckdb duckdb-node
DuckDB is an analytical in-process SQL database management system. On 08 September 2025, the DuckDB distribution for Node.js on npm was compromised with malware (along with several other packages). An attacker published new versions of four of DuckDB's packages that included malicious code to interfere with cryptocoin transactions* According to the npm statistics, nobody has downloaded these packages before they were deprecated. The packages and versions `@duckdb/node-api@1.3.3`, `@duckdb/node-bindings@1.3.3`, `duckdb@1.3.3`, and `@duckdb/duckdb-wasm@1.29.2` were affected. DuckDB immediately deprecated the specific versions, engaged npm support to delete the affected verions, and re-released the node packages with higher version numbers (1.3.4/1.30.0). Users may upgrade to versions 1.3.4, 1.30.0, or a higher version to protect themselves. As a workaround, they may also downgrade to 1.3.2 or 1.29.1.
AI Analysis
Technical Summary
CVE-2025-59037 is a high-severity vulnerability affecting specific versions of the DuckDB Node.js packages, namely @duckdb/node-api@1.3.3, @duckdb/node-bindings@1.3.3, duckdb@1.3.3, and @duckdb/duckdb-wasm@1.29.2. DuckDB is an analytical in-process SQL database management system widely used for embedded analytics and data processing within applications. On September 8, 2025, these packages were compromised on the npm repository, with attackers publishing malicious versions containing embedded code designed to interfere with cryptocoin transactions. This malicious code could potentially manipulate or disrupt cryptocurrency-related operations executed through applications relying on these compromised packages. The vulnerability is classified under CWE-506, which involves embedded malicious code, indicating that the threat stems from intentional inclusion of harmful code within legitimate software components. The CVSS 4.0 base score is 8.6 (high), reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction. The impact on confidentiality, integrity, and availability is high, as the malicious code can alter transaction data and potentially cause financial loss or data corruption. Although no known exploits are reported in the wild, the risk remains significant due to the nature of the malicious payload and the popularity of the affected packages. DuckDB responded promptly by deprecating the compromised versions, collaborating with npm to remove them, and releasing patched versions (1.3.4 and 1.30.0). Users are advised to upgrade to these or later versions or alternatively downgrade to safe earlier versions (1.3.2 or 1.29.1) to mitigate risk.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those involved in financial services, fintech, or any sector utilizing DuckDB for embedded analytics that may process cryptocurrency transactions. The malicious code could lead to unauthorized manipulation or disruption of crypto transactions, resulting in financial losses, reputational damage, and regulatory scrutiny under frameworks such as GDPR and the EU's Digital Operational Resilience Act (DORA). Additionally, organizations relying on these packages for data integrity and analytics may face data corruption or loss of trust in their data processing pipelines. The fact that exploitation requires user interaction (e.g., installing or updating the compromised package) means that organizations with robust software supply chain security and package vetting processes may reduce exposure. However, given the widespread use of npm packages and the ease of automatic dependency updates, the risk of inadvertent installation remains high. The incident underscores the criticality of supply chain security in software development and the need for continuous monitoring of package integrity.
Mitigation Recommendations
1. Immediate upgrade to patched versions: Organizations should promptly update all DuckDB Node.js packages to versions 1.3.4, 1.30.0, or later to eliminate the malicious code. 2. Downgrade as a temporary measure: If immediate upgrading is not feasible, downgrade to known safe versions 1.3.2 or 1.29.1 to avoid exposure. 3. Implement strict dependency management: Use tools that verify package integrity such as npm audit, package signing, and reproducible builds to detect tampering. 4. Employ software supply chain security best practices: Integrate automated scanning for malicious code in dependencies, enforce code reviews for package updates, and restrict package installation privileges. 5. Monitor network and application behavior: Deploy anomaly detection to identify suspicious activities related to cryptocurrency transactions or unusual database operations. 6. Educate developers and DevOps teams: Raise awareness about supply chain risks and encourage cautious adoption of new package versions, especially from third-party sources. 7. Maintain an inventory of dependencies: Track all versions of DuckDB packages in use across projects to ensure timely patching and incident response readiness.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland, Ireland
CVE-2025-59037: CWE-506: Embedded Malicious Code in duckdb duckdb-node
Description
DuckDB is an analytical in-process SQL database management system. On 08 September 2025, the DuckDB distribution for Node.js on npm was compromised with malware (along with several other packages). An attacker published new versions of four of DuckDB's packages that included malicious code to interfere with cryptocoin transactions* According to the npm statistics, nobody has downloaded these packages before they were deprecated. The packages and versions `@duckdb/node-api@1.3.3`, `@duckdb/node-bindings@1.3.3`, `duckdb@1.3.3`, and `@duckdb/duckdb-wasm@1.29.2` were affected. DuckDB immediately deprecated the specific versions, engaged npm support to delete the affected verions, and re-released the node packages with higher version numbers (1.3.4/1.30.0). Users may upgrade to versions 1.3.4, 1.30.0, or a higher version to protect themselves. As a workaround, they may also downgrade to 1.3.2 or 1.29.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-59037 is a high-severity vulnerability affecting specific versions of the DuckDB Node.js packages, namely @duckdb/node-api@1.3.3, @duckdb/node-bindings@1.3.3, duckdb@1.3.3, and @duckdb/duckdb-wasm@1.29.2. DuckDB is an analytical in-process SQL database management system widely used for embedded analytics and data processing within applications. On September 8, 2025, these packages were compromised on the npm repository, with attackers publishing malicious versions containing embedded code designed to interfere with cryptocoin transactions. This malicious code could potentially manipulate or disrupt cryptocurrency-related operations executed through applications relying on these compromised packages. The vulnerability is classified under CWE-506, which involves embedded malicious code, indicating that the threat stems from intentional inclusion of harmful code within legitimate software components. The CVSS 4.0 base score is 8.6 (high), reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction. The impact on confidentiality, integrity, and availability is high, as the malicious code can alter transaction data and potentially cause financial loss or data corruption. Although no known exploits are reported in the wild, the risk remains significant due to the nature of the malicious payload and the popularity of the affected packages. DuckDB responded promptly by deprecating the compromised versions, collaborating with npm to remove them, and releasing patched versions (1.3.4 and 1.30.0). Users are advised to upgrade to these or later versions or alternatively downgrade to safe earlier versions (1.3.2 or 1.29.1) to mitigate risk.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those involved in financial services, fintech, or any sector utilizing DuckDB for embedded analytics that may process cryptocurrency transactions. The malicious code could lead to unauthorized manipulation or disruption of crypto transactions, resulting in financial losses, reputational damage, and regulatory scrutiny under frameworks such as GDPR and the EU's Digital Operational Resilience Act (DORA). Additionally, organizations relying on these packages for data integrity and analytics may face data corruption or loss of trust in their data processing pipelines. The fact that exploitation requires user interaction (e.g., installing or updating the compromised package) means that organizations with robust software supply chain security and package vetting processes may reduce exposure. However, given the widespread use of npm packages and the ease of automatic dependency updates, the risk of inadvertent installation remains high. The incident underscores the criticality of supply chain security in software development and the need for continuous monitoring of package integrity.
Mitigation Recommendations
1. Immediate upgrade to patched versions: Organizations should promptly update all DuckDB Node.js packages to versions 1.3.4, 1.30.0, or later to eliminate the malicious code. 2. Downgrade as a temporary measure: If immediate upgrading is not feasible, downgrade to known safe versions 1.3.2 or 1.29.1 to avoid exposure. 3. Implement strict dependency management: Use tools that verify package integrity such as npm audit, package signing, and reproducible builds to detect tampering. 4. Employ software supply chain security best practices: Integrate automated scanning for malicious code in dependencies, enforce code reviews for package updates, and restrict package installation privileges. 5. Monitor network and application behavior: Deploy anomaly detection to identify suspicious activities related to cryptocurrency transactions or unusual database operations. 6. Educate developers and DevOps teams: Raise awareness about supply chain risks and encourage cautious adoption of new package versions, especially from third-party sources. 7. Maintain an inventory of dependencies: Track all versions of DuckDB packages in use across projects to ensure timely patching and incident response readiness.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-08T16:19:26.171Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c08ee596774cc5680167bd
Added to database: 9/9/2025, 8:32:37 PM
Last enriched: 9/9/2025, 8:35:47 PM
Last updated: 9/10/2025, 4:07:21 AM
Views: 10
Related Threats
CVE-2025-8388: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ideaboxcreations PowerPack Elementor Addons (Free Widgets, Extensions and Templates)
MediumCVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.