Skip to main content

CVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js

High
VulnerabilityCVE-2025-59038cvecve-2025-59038cwe-506
Published: Tue Sep 09 2025 (09/09/2025, 22:17:08 UTC)
Source: CVE Database V5
Vendor/Project: prebid
Product: Prebid.js

Description

Prebid.js is a free and open source library for publishers to quickly implement header bidding. NPM users of prebid 10.9.2 may have been briefly compromised by a malware campaign. The malicious code attempts to redirect crypto transactions on the site to the attackers' wallet. Version 10.10.0 fixes the issue. As a workaround, it is also possible to downgrade to 10.9.1.

AI-Powered Analysis

AILast updated: 09/10/2025, 03:10:36 UTC

Technical Analysis

CVE-2025-59038 is a high-severity vulnerability affecting Prebid.js version 10.9.2, an open-source JavaScript library widely used by online publishers to implement header bidding for programmatic advertising. The vulnerability is classified under CWE-506, which pertains to embedded malicious code. In this case, the malicious code was introduced into the Prebid.js 10.9.2 release, potentially via a supply chain compromise or unauthorized code injection. The embedded malware attempts to intercept and redirect cryptocurrency transactions initiated on websites using the compromised library version, diverting funds to attacker-controlled wallets. This attack vector leverages the trust publishers place in Prebid.js as a third-party dependency, allowing attackers to manipulate client-side transaction flows without requiring user authentication or elevated privileges. The vulnerability does not require prior authentication but does require user interaction, as the malicious code activates during normal site use involving crypto transactions. The issue was resolved in Prebid.js version 10.10.0, with a recommended workaround to downgrade to version 10.9.1, which is unaffected. The CVSS 4.0 base score of 8.6 reflects the network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality, integrity, and availability of the affected systems. No known exploits have been reported in the wild as of the publication date, but the potential for financial theft and reputational damage is significant given the nature of the targeted transactions and the widespread use of Prebid.js in the digital advertising ecosystem.

Potential Impact

European organizations relying on Prebid.js 10.9.2 for header bidding in their web properties face significant risks from this vulnerability. The primary impact is financial loss through redirected cryptocurrency transactions, which can directly affect e-commerce platforms, financial services, and any online business accepting crypto payments. The integrity of transaction data is compromised, undermining trust in the affected websites. Additionally, the presence of malicious code can lead to reputational damage, regulatory scrutiny under GDPR due to potential unauthorized data manipulation, and increased operational costs for incident response and remediation. Since Prebid.js is commonly used by digital publishers and advertising platforms, media companies and online marketplaces in Europe are particularly vulnerable. The attack does not require authentication but depends on user interaction, meaning end-users engaging in crypto transactions are at risk. The widespread adoption of Prebid.js in Europe, combined with the growing use of cryptocurrencies, amplifies the threat's potential impact across multiple sectors.

Mitigation Recommendations

European organizations should immediately verify their use of Prebid.js and identify any instances of version 10.9.2 in their web environments. The primary mitigation is to upgrade to Prebid.js version 10.10.0, which contains the fix for this vulnerability. If immediate upgrading is not feasible, downgrading to version 10.9.1 is a viable temporary workaround. Organizations should audit their supply chain and code repositories to ensure no unauthorized code persists. Implementing strict integrity checks such as Subresource Integrity (SRI) for JavaScript libraries can prevent tampered scripts from loading. Monitoring outgoing crypto transaction endpoints for anomalies or unexpected redirects can help detect exploitation attempts. Additionally, web application firewalls (WAFs) should be configured to detect and block suspicious script behaviors related to transaction redirection. Educating developers and security teams about supply chain risks and enforcing secure development lifecycle practices will reduce future exposure. Finally, organizations should review their incident response plans to address potential financial fraud stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-08T16:19:26.171Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c0ec1da3df14e7d73649e5

Added to database: 9/10/2025, 3:10:21 AM

Last enriched: 9/10/2025, 3:10:36 AM

Last updated: 9/10/2025, 5:32:45 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats