CVE-2025-59039: CWE-506: Embedded Malicious Code in prebid prebid-universal-creative
Prebid Universal Creative (PUC) is a JavaScript API to render multiple formats. Npm users of PUC 1.17.3 or PUC latest were briefly affected by crypto-related malware. This includes the extremely popular jsdelivr hosting of this file. The maintainers of PUC unpublished version 1.17.3. Users should see Prebid.js 9 release notes for suggestions on moving off the deprecated workflow of using the PUC or pointing to a dynamic version of it. PUC users pointing to latest should transition to 1.17.2 as soon as possible to avoid similar attacks in the future.
AI Analysis
Technical Summary
CVE-2025-59039 is a critical vulnerability identified in the Prebid Universal Creative (PUC) JavaScript API, specifically affecting version 1.17.3. PUC is widely used to render multiple ad formats in web environments and is commonly integrated via npm and hosted on popular content delivery networks such as jsdelivr. The vulnerability involves embedded malicious code related to cryptocurrency malware within the affected version. This malicious code could execute without requiring user interaction or authentication, leading to significant compromise of confidentiality, integrity, and availability of affected systems. The vulnerability is classified under CWE-506, which pertains to embedded malicious code, indicating that the malicious payload was intentionally or unintentionally included within the legitimate software package. The maintainers responded by unpublishing version 1.17.3 and recommending users to transition to version 1.17.2 or follow the Prebid.js 9 release notes to move away from deprecated workflows that rely on dynamic referencing of PUC. The CVSS 4.0 base score of 9.3 reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits have been observed in the wild yet, the widespread use of PUC in advertising technology stacks makes this vulnerability a significant risk, especially for organizations relying on dynamic ad content rendering. Attackers could leverage this vulnerability to inject crypto-mining malware or other malicious scripts, potentially leading to resource exhaustion, data leakage, or broader network compromise.
Potential Impact
For European organizations, the impact of this vulnerability is substantial due to the extensive use of Prebid.js and its Universal Creative module in digital advertising ecosystems across Europe. Compromise through this vulnerability could lead to unauthorized cryptocurrency mining, resulting in degraded system performance and increased operational costs. More critically, the embedded malicious code could serve as a foothold for further attacks, including data exfiltration or lateral movement within corporate networks. Given the GDPR regulatory environment, any data leakage or compromise could also result in significant legal and financial penalties. Organizations involved in digital marketing, media, and e-commerce are particularly at risk, as they often integrate such ad technologies directly into their web platforms. The lack of required authentication and user interaction for exploitation increases the risk of automated widespread attacks. Additionally, the use of popular CDNs like jsdelivr to host the compromised version increases the attack surface, potentially affecting numerous organizations simultaneously. The reputational damage from serving malicious ads or compromised content could also be severe, impacting customer trust and business continuity.
Mitigation Recommendations
European organizations should immediately audit their use of Prebid Universal Creative, specifically checking for version 1.17.3 or any dynamic references to the latest version that might resolve to the compromised release. They should transition to version 1.17.2 or follow the guidance in the Prebid.js 9 release notes to adopt supported workflows that do not rely on deprecated or dynamically referenced versions of PUC. It is critical to implement strict dependency management practices, including locking package versions and verifying package integrity using cryptographic signatures or checksums. Organizations should also monitor their CDN usage to ensure that no compromised versions are being served from third-party hosts like jsdelivr. Deploying runtime security controls such as Content Security Policy (CSP) headers can help mitigate the impact by restricting the execution of unauthorized scripts. Additionally, network-level monitoring for unusual outbound connections or resource usage spikes can help detect potential crypto-mining activity. Regular security awareness training for developers and IT staff on supply chain risks and secure package management is recommended to prevent similar issues in the future.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2025-59039: CWE-506: Embedded Malicious Code in prebid prebid-universal-creative
Description
Prebid Universal Creative (PUC) is a JavaScript API to render multiple formats. Npm users of PUC 1.17.3 or PUC latest were briefly affected by crypto-related malware. This includes the extremely popular jsdelivr hosting of this file. The maintainers of PUC unpublished version 1.17.3. Users should see Prebid.js 9 release notes for suggestions on moving off the deprecated workflow of using the PUC or pointing to a dynamic version of it. PUC users pointing to latest should transition to 1.17.2 as soon as possible to avoid similar attacks in the future.
AI-Powered Analysis
Technical Analysis
CVE-2025-59039 is a critical vulnerability identified in the Prebid Universal Creative (PUC) JavaScript API, specifically affecting version 1.17.3. PUC is widely used to render multiple ad formats in web environments and is commonly integrated via npm and hosted on popular content delivery networks such as jsdelivr. The vulnerability involves embedded malicious code related to cryptocurrency malware within the affected version. This malicious code could execute without requiring user interaction or authentication, leading to significant compromise of confidentiality, integrity, and availability of affected systems. The vulnerability is classified under CWE-506, which pertains to embedded malicious code, indicating that the malicious payload was intentionally or unintentionally included within the legitimate software package. The maintainers responded by unpublishing version 1.17.3 and recommending users to transition to version 1.17.2 or follow the Prebid.js 9 release notes to move away from deprecated workflows that rely on dynamic referencing of PUC. The CVSS 4.0 base score of 9.3 reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits have been observed in the wild yet, the widespread use of PUC in advertising technology stacks makes this vulnerability a significant risk, especially for organizations relying on dynamic ad content rendering. Attackers could leverage this vulnerability to inject crypto-mining malware or other malicious scripts, potentially leading to resource exhaustion, data leakage, or broader network compromise.
Potential Impact
For European organizations, the impact of this vulnerability is substantial due to the extensive use of Prebid.js and its Universal Creative module in digital advertising ecosystems across Europe. Compromise through this vulnerability could lead to unauthorized cryptocurrency mining, resulting in degraded system performance and increased operational costs. More critically, the embedded malicious code could serve as a foothold for further attacks, including data exfiltration or lateral movement within corporate networks. Given the GDPR regulatory environment, any data leakage or compromise could also result in significant legal and financial penalties. Organizations involved in digital marketing, media, and e-commerce are particularly at risk, as they often integrate such ad technologies directly into their web platforms. The lack of required authentication and user interaction for exploitation increases the risk of automated widespread attacks. Additionally, the use of popular CDNs like jsdelivr to host the compromised version increases the attack surface, potentially affecting numerous organizations simultaneously. The reputational damage from serving malicious ads or compromised content could also be severe, impacting customer trust and business continuity.
Mitigation Recommendations
European organizations should immediately audit their use of Prebid Universal Creative, specifically checking for version 1.17.3 or any dynamic references to the latest version that might resolve to the compromised release. They should transition to version 1.17.2 or follow the guidance in the Prebid.js 9 release notes to adopt supported workflows that do not rely on deprecated or dynamically referenced versions of PUC. It is critical to implement strict dependency management practices, including locking package versions and verifying package integrity using cryptographic signatures or checksums. Organizations should also monitor their CDN usage to ensure that no compromised versions are being served from third-party hosts like jsdelivr. Deploying runtime security controls such as Content Security Policy (CSP) headers can help mitigate the impact by restricting the execution of unauthorized scripts. Additionally, network-level monitoring for unusual outbound connections or resource usage spikes can help detect potential crypto-mining activity. Regular security awareness training for developers and IT staff on supply chain risks and secure package management is recommended to prevent similar issues in the future.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-08T16:19:26.171Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c0abb29ed239a66bad7807
Added to database: 9/9/2025, 10:35:30 PM
Last enriched: 9/9/2025, 10:50:24 PM
Last updated: 9/10/2025, 12:33:08 AM
Views: 4
Related Threats
CVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21336: CWE-203: Observable Discrepancy in Microsoft Windows 10 Version 1809
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.