CVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
Prebid.js is a free and open source library for publishers to quickly implement header bidding. NPM users of prebid 10.9.2 may have been briefly compromised by a malware campaign. The malicious code attempts to redirect crypto transactions on the site to the attackers' wallet. Version 10.10.0 fixes the issue. As a workaround, it is also possible to downgrade to 10.9.1.
AI Analysis
Technical Summary
CVE-2025-59038 is a high-severity vulnerability affecting Prebid.js version 10.9.2, an open-source JavaScript library widely used by online publishers to implement header bidding for programmatic advertising. The vulnerability is classified under CWE-506, which pertains to embedded malicious code. In this case, the malicious code was introduced into the Prebid.js 10.9.2 release, potentially via a supply chain compromise or unauthorized code injection. The embedded malware attempts to intercept and redirect cryptocurrency transactions initiated on websites using the compromised library version, diverting funds to attacker-controlled wallets. This attack vector leverages the trust publishers place in Prebid.js as a third-party dependency, allowing attackers to manipulate client-side transaction flows without requiring user authentication or elevated privileges. The vulnerability does not require prior authentication but does require user interaction, as the malicious code activates during normal site use involving crypto transactions. The issue was resolved in Prebid.js version 10.10.0, with a recommended workaround to downgrade to version 10.9.1, which is unaffected. The CVSS 4.0 base score of 8.6 reflects the network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality, integrity, and availability of the affected systems. No known exploits have been reported in the wild as of the publication date, but the potential for financial theft and reputational damage is significant given the nature of the targeted transactions and the widespread use of Prebid.js in the digital advertising ecosystem.
Potential Impact
European organizations relying on Prebid.js 10.9.2 for header bidding in their web properties face significant risks from this vulnerability. The primary impact is financial loss through redirected cryptocurrency transactions, which can directly affect e-commerce platforms, financial services, and any online business accepting crypto payments. The integrity of transaction data is compromised, undermining trust in the affected websites. Additionally, the presence of malicious code can lead to reputational damage, regulatory scrutiny under GDPR due to potential unauthorized data manipulation, and increased operational costs for incident response and remediation. Since Prebid.js is commonly used by digital publishers and advertising platforms, media companies and online marketplaces in Europe are particularly vulnerable. The attack does not require authentication but depends on user interaction, meaning end-users engaging in crypto transactions are at risk. The widespread adoption of Prebid.js in Europe, combined with the growing use of cryptocurrencies, amplifies the threat's potential impact across multiple sectors.
Mitigation Recommendations
European organizations should immediately verify their use of Prebid.js and identify any instances of version 10.9.2 in their web environments. The primary mitigation is to upgrade to Prebid.js version 10.10.0, which contains the fix for this vulnerability. If immediate upgrading is not feasible, downgrading to version 10.9.1 is a viable temporary workaround. Organizations should audit their supply chain and code repositories to ensure no unauthorized code persists. Implementing strict integrity checks such as Subresource Integrity (SRI) for JavaScript libraries can prevent tampered scripts from loading. Monitoring outgoing crypto transaction endpoints for anomalies or unexpected redirects can help detect exploitation attempts. Additionally, web application firewalls (WAFs) should be configured to detect and block suspicious script behaviors related to transaction redirection. Educating developers and security teams about supply chain risks and enforcing secure development lifecycle practices will reduce future exposure. Finally, organizations should review their incident response plans to address potential financial fraud stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
Description
Prebid.js is a free and open source library for publishers to quickly implement header bidding. NPM users of prebid 10.9.2 may have been briefly compromised by a malware campaign. The malicious code attempts to redirect crypto transactions on the site to the attackers' wallet. Version 10.10.0 fixes the issue. As a workaround, it is also possible to downgrade to 10.9.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-59038 is a high-severity vulnerability affecting Prebid.js version 10.9.2, an open-source JavaScript library widely used by online publishers to implement header bidding for programmatic advertising. The vulnerability is classified under CWE-506, which pertains to embedded malicious code. In this case, the malicious code was introduced into the Prebid.js 10.9.2 release, potentially via a supply chain compromise or unauthorized code injection. The embedded malware attempts to intercept and redirect cryptocurrency transactions initiated on websites using the compromised library version, diverting funds to attacker-controlled wallets. This attack vector leverages the trust publishers place in Prebid.js as a third-party dependency, allowing attackers to manipulate client-side transaction flows without requiring user authentication or elevated privileges. The vulnerability does not require prior authentication but does require user interaction, as the malicious code activates during normal site use involving crypto transactions. The issue was resolved in Prebid.js version 10.10.0, with a recommended workaround to downgrade to version 10.9.1, which is unaffected. The CVSS 4.0 base score of 8.6 reflects the network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality, integrity, and availability of the affected systems. No known exploits have been reported in the wild as of the publication date, but the potential for financial theft and reputational damage is significant given the nature of the targeted transactions and the widespread use of Prebid.js in the digital advertising ecosystem.
Potential Impact
European organizations relying on Prebid.js 10.9.2 for header bidding in their web properties face significant risks from this vulnerability. The primary impact is financial loss through redirected cryptocurrency transactions, which can directly affect e-commerce platforms, financial services, and any online business accepting crypto payments. The integrity of transaction data is compromised, undermining trust in the affected websites. Additionally, the presence of malicious code can lead to reputational damage, regulatory scrutiny under GDPR due to potential unauthorized data manipulation, and increased operational costs for incident response and remediation. Since Prebid.js is commonly used by digital publishers and advertising platforms, media companies and online marketplaces in Europe are particularly vulnerable. The attack does not require authentication but depends on user interaction, meaning end-users engaging in crypto transactions are at risk. The widespread adoption of Prebid.js in Europe, combined with the growing use of cryptocurrencies, amplifies the threat's potential impact across multiple sectors.
Mitigation Recommendations
European organizations should immediately verify their use of Prebid.js and identify any instances of version 10.9.2 in their web environments. The primary mitigation is to upgrade to Prebid.js version 10.10.0, which contains the fix for this vulnerability. If immediate upgrading is not feasible, downgrading to version 10.9.1 is a viable temporary workaround. Organizations should audit their supply chain and code repositories to ensure no unauthorized code persists. Implementing strict integrity checks such as Subresource Integrity (SRI) for JavaScript libraries can prevent tampered scripts from loading. Monitoring outgoing crypto transaction endpoints for anomalies or unexpected redirects can help detect exploitation attempts. Additionally, web application firewalls (WAFs) should be configured to detect and block suspicious script behaviors related to transaction redirection. Educating developers and security teams about supply chain risks and enforcing secure development lifecycle practices will reduce future exposure. Finally, organizations should review their incident response plans to address potential financial fraud stemming from this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-08T16:19:26.171Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c0ec1da3df14e7d73649e5
Added to database: 9/10/2025, 3:10:21 AM
Last enriched: 9/10/2025, 3:10:36 AM
Last updated: 9/10/2025, 5:32:45 AM
Views: 5
Related Threats
CVE-2025-9943: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Shibboleth Service Provider
CriticalCVE-2025-41714: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Welotec SmartEMS Web Application
HighCVE-2025-9979: CWE-862 Missing Authorization in yonifre Maspik – Ultimate Spam Protection
MediumCVE-2025-9888: CWE-352 Cross-Site Request Forgery (CSRF) in yonifre Maspik – Ultimate Spam Protection
MediumCVE-2025-9857: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in heateor Heateor Login – Social Login Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.