CVE-2025-59039: CWE-506: Embedded Malicious Code in prebid prebid-universal-creative
Prebid Universal Creative (PUC) is a JavaScript API to render multiple formats. Npm users of PUC 1.17.3 or PUC latest were briefly affected by crypto-related malware. This includes the extremely popular jsdelivr hosting of this file. The maintainers of PUC unpublished version 1.17.3. Users should see Prebid.js 9 release notes for suggestions on moving off the deprecated workflow of using the PUC or pointing to a dynamic version of it. PUC users pointing to latest should transition to 1.17.2 as soon as possible to avoid similar attacks in the future.
AI Analysis
Technical Summary
CVE-2025-59039 is a critical security vulnerability affecting Prebid Universal Creative (PUC), a JavaScript API widely used to render multiple ad formats in web environments. Specifically, version 1.17.3 of PUC was found to contain embedded malicious crypto-related malware. This malicious code was distributed through the npm package and was also hosted on the popular jsdelivr CDN, which serves many web applications. The vulnerability is classified under CWE-506, which involves embedded malicious code that can compromise the integrity and trustworthiness of software components. The malicious payload in PUC 1.17.3 could execute without any user interaction, authentication, or privileges, making it highly exploitable. The CVSS 4.0 base score of 9.3 reflects its critical severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact vector metrics indicate high confidentiality, integrity, and availability impacts, meaning the malware could exfiltrate sensitive data, alter content, or disrupt service availability. Although no known exploits have been observed in the wild yet, the maintainers have unpublished version 1.17.3 and recommend users to downgrade to version 1.17.2 or migrate to the newer Prebid.js 9 workflow, which deprecates PUC usage or points to a dynamic version to avoid similar supply chain attacks. This vulnerability highlights the risks of supply chain compromises in widely used JavaScript libraries, especially those served via popular CDNs, which can affect a broad range of websites and applications relying on these components for ad rendering and monetization.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for digital publishers, advertising platforms, and any web services that integrate Prebid Universal Creative for ad rendering. The embedded malicious crypto malware could lead to unauthorized cryptomining activities, degrading system performance and increasing operational costs. More critically, it could facilitate data exfiltration, compromise user privacy, and damage brand reputation. Given the widespread use of jsdelivr CDN and npm packages in Europe, many organizations may have unknowingly integrated the compromised version, exposing them to supply chain risks. This could also lead to regulatory compliance issues under GDPR if personal data is compromised. Additionally, the disruption of ad services could impact revenue streams for media companies and online platforms. The lack of required authentication and user interaction means attackers could exploit this vulnerability remotely and at scale, increasing the risk of widespread impact across European digital ecosystems.
Mitigation Recommendations
European organizations should immediately audit their use of Prebid Universal Creative, specifically checking for version 1.17.3 usage. They should remove or replace this version with 1.17.2 or migrate to the recommended Prebid.js 9 workflow that avoids deprecated PUC usage. It is critical to avoid referencing dynamic 'latest' versions in production environments to prevent automatic adoption of compromised releases. Organizations should also implement strict software supply chain security practices, including verifying package integrity via checksums or signatures, and monitoring CDN usage for unexpected changes. Employing runtime application self-protection (RASP) or web application firewalls (WAF) with behavioral anomaly detection can help identify malicious activity stemming from compromised scripts. Regular dependency scanning and automated alerts for vulnerable packages should be integrated into CI/CD pipelines. Finally, organizations should review their incident response plans to address potential cryptomining or data exfiltration incidents resulting from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-59039: CWE-506: Embedded Malicious Code in prebid prebid-universal-creative
Description
Prebid Universal Creative (PUC) is a JavaScript API to render multiple formats. Npm users of PUC 1.17.3 or PUC latest were briefly affected by crypto-related malware. This includes the extremely popular jsdelivr hosting of this file. The maintainers of PUC unpublished version 1.17.3. Users should see Prebid.js 9 release notes for suggestions on moving off the deprecated workflow of using the PUC or pointing to a dynamic version of it. PUC users pointing to latest should transition to 1.17.2 as soon as possible to avoid similar attacks in the future.
AI-Powered Analysis
Technical Analysis
CVE-2025-59039 is a critical security vulnerability affecting Prebid Universal Creative (PUC), a JavaScript API widely used to render multiple ad formats in web environments. Specifically, version 1.17.3 of PUC was found to contain embedded malicious crypto-related malware. This malicious code was distributed through the npm package and was also hosted on the popular jsdelivr CDN, which serves many web applications. The vulnerability is classified under CWE-506, which involves embedded malicious code that can compromise the integrity and trustworthiness of software components. The malicious payload in PUC 1.17.3 could execute without any user interaction, authentication, or privileges, making it highly exploitable. The CVSS 4.0 base score of 9.3 reflects its critical severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact vector metrics indicate high confidentiality, integrity, and availability impacts, meaning the malware could exfiltrate sensitive data, alter content, or disrupt service availability. Although no known exploits have been observed in the wild yet, the maintainers have unpublished version 1.17.3 and recommend users to downgrade to version 1.17.2 or migrate to the newer Prebid.js 9 workflow, which deprecates PUC usage or points to a dynamic version to avoid similar supply chain attacks. This vulnerability highlights the risks of supply chain compromises in widely used JavaScript libraries, especially those served via popular CDNs, which can affect a broad range of websites and applications relying on these components for ad rendering and monetization.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for digital publishers, advertising platforms, and any web services that integrate Prebid Universal Creative for ad rendering. The embedded malicious crypto malware could lead to unauthorized cryptomining activities, degrading system performance and increasing operational costs. More critically, it could facilitate data exfiltration, compromise user privacy, and damage brand reputation. Given the widespread use of jsdelivr CDN and npm packages in Europe, many organizations may have unknowingly integrated the compromised version, exposing them to supply chain risks. This could also lead to regulatory compliance issues under GDPR if personal data is compromised. Additionally, the disruption of ad services could impact revenue streams for media companies and online platforms. The lack of required authentication and user interaction means attackers could exploit this vulnerability remotely and at scale, increasing the risk of widespread impact across European digital ecosystems.
Mitigation Recommendations
European organizations should immediately audit their use of Prebid Universal Creative, specifically checking for version 1.17.3 usage. They should remove or replace this version with 1.17.2 or migrate to the recommended Prebid.js 9 workflow that avoids deprecated PUC usage. It is critical to avoid referencing dynamic 'latest' versions in production environments to prevent automatic adoption of compromised releases. Organizations should also implement strict software supply chain security practices, including verifying package integrity via checksums or signatures, and monitoring CDN usage for unexpected changes. Employing runtime application self-protection (RASP) or web application firewalls (WAF) with behavioral anomaly detection can help identify malicious activity stemming from compromised scripts. Regular dependency scanning and automated alerts for vulnerable packages should be integrated into CI/CD pipelines. Finally, organizations should review their incident response plans to address potential cryptomining or data exfiltration incidents resulting from this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-08T16:19:26.171Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c0abb29ed239a66bad7807
Added to database: 9/9/2025, 10:35:30 PM
Last enriched: 9/17/2025, 12:56:22 AM
Last updated: 10/30/2025, 2:09:53 PM
Views: 122
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumCVE-2025-63608: n/a
HighCVE-2025-10317: CWE-352 Cross-Site Request Forgery (CSRF) in OpenSolution Quick.Cart
MediumCVE-2025-39663: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Checkmk GmbH Checkmk
HighCVE-2025-53883: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in SUSE Container suse manager 5.0
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.