Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59039: CWE-506: Embedded Malicious Code in prebid prebid-universal-creative

0
Critical
VulnerabilityCVE-2025-59039cvecve-2025-59039cwe-506
Published: Tue Sep 09 2025 (09/09/2025, 22:23:55 UTC)
Source: CVE Database V5
Vendor/Project: prebid
Product: prebid-universal-creative

Description

Prebid Universal Creative (PUC) is a JavaScript API to render multiple formats. Npm users of PUC 1.17.3 or PUC latest were briefly affected by crypto-related malware. This includes the extremely popular jsdelivr hosting of this file. The maintainers of PUC unpublished version 1.17.3. Users should see Prebid.js 9 release notes for suggestions on moving off the deprecated workflow of using the PUC or pointing to a dynamic version of it. PUC users pointing to latest should transition to 1.17.2 as soon as possible to avoid similar attacks in the future.

AI-Powered Analysis

AILast updated: 09/17/2025, 00:56:22 UTC

Technical Analysis

CVE-2025-59039 is a critical security vulnerability affecting Prebid Universal Creative (PUC), a JavaScript API widely used to render multiple ad formats in web environments. Specifically, version 1.17.3 of PUC was found to contain embedded malicious crypto-related malware. This malicious code was distributed through the npm package and was also hosted on the popular jsdelivr CDN, which serves many web applications. The vulnerability is classified under CWE-506, which involves embedded malicious code that can compromise the integrity and trustworthiness of software components. The malicious payload in PUC 1.17.3 could execute without any user interaction, authentication, or privileges, making it highly exploitable. The CVSS 4.0 base score of 9.3 reflects its critical severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact vector metrics indicate high confidentiality, integrity, and availability impacts, meaning the malware could exfiltrate sensitive data, alter content, or disrupt service availability. Although no known exploits have been observed in the wild yet, the maintainers have unpublished version 1.17.3 and recommend users to downgrade to version 1.17.2 or migrate to the newer Prebid.js 9 workflow, which deprecates PUC usage or points to a dynamic version to avoid similar supply chain attacks. This vulnerability highlights the risks of supply chain compromises in widely used JavaScript libraries, especially those served via popular CDNs, which can affect a broad range of websites and applications relying on these components for ad rendering and monetization.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for digital publishers, advertising platforms, and any web services that integrate Prebid Universal Creative for ad rendering. The embedded malicious crypto malware could lead to unauthorized cryptomining activities, degrading system performance and increasing operational costs. More critically, it could facilitate data exfiltration, compromise user privacy, and damage brand reputation. Given the widespread use of jsdelivr CDN and npm packages in Europe, many organizations may have unknowingly integrated the compromised version, exposing them to supply chain risks. This could also lead to regulatory compliance issues under GDPR if personal data is compromised. Additionally, the disruption of ad services could impact revenue streams for media companies and online platforms. The lack of required authentication and user interaction means attackers could exploit this vulnerability remotely and at scale, increasing the risk of widespread impact across European digital ecosystems.

Mitigation Recommendations

European organizations should immediately audit their use of Prebid Universal Creative, specifically checking for version 1.17.3 usage. They should remove or replace this version with 1.17.2 or migrate to the recommended Prebid.js 9 workflow that avoids deprecated PUC usage. It is critical to avoid referencing dynamic 'latest' versions in production environments to prevent automatic adoption of compromised releases. Organizations should also implement strict software supply chain security practices, including verifying package integrity via checksums or signatures, and monitoring CDN usage for unexpected changes. Employing runtime application self-protection (RASP) or web application firewalls (WAF) with behavioral anomaly detection can help identify malicious activity stemming from compromised scripts. Regular dependency scanning and automated alerts for vulnerable packages should be integrated into CI/CD pipelines. Finally, organizations should review their incident response plans to address potential cryptomining or data exfiltration incidents resulting from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-08T16:19:26.171Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c0abb29ed239a66bad7807

Added to database: 9/9/2025, 10:35:30 PM

Last enriched: 9/17/2025, 12:56:22 AM

Last updated: 10/30/2025, 2:09:53 PM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats