Skip to main content

CVE-2025-59039: CWE-506: Embedded Malicious Code in prebid prebid-universal-creative

Critical
VulnerabilityCVE-2025-59039cvecve-2025-59039cwe-506
Published: Tue Sep 09 2025 (09/09/2025, 22:23:55 UTC)
Source: CVE Database V5
Vendor/Project: prebid
Product: prebid-universal-creative

Description

Prebid Universal Creative (PUC) is a JavaScript API to render multiple formats. Npm users of PUC 1.17.3 or PUC latest were briefly affected by crypto-related malware. This includes the extremely popular jsdelivr hosting of this file. The maintainers of PUC unpublished version 1.17.3. Users should see Prebid.js 9 release notes for suggestions on moving off the deprecated workflow of using the PUC or pointing to a dynamic version of it. PUC users pointing to latest should transition to 1.17.2 as soon as possible to avoid similar attacks in the future.

AI-Powered Analysis

AILast updated: 09/09/2025, 22:50:24 UTC

Technical Analysis

CVE-2025-59039 is a critical vulnerability identified in the Prebid Universal Creative (PUC) JavaScript API, specifically affecting version 1.17.3. PUC is widely used to render multiple ad formats in web environments and is commonly integrated via npm and hosted on popular content delivery networks such as jsdelivr. The vulnerability involves embedded malicious code related to cryptocurrency malware within the affected version. This malicious code could execute without requiring user interaction or authentication, leading to significant compromise of confidentiality, integrity, and availability of affected systems. The vulnerability is classified under CWE-506, which pertains to embedded malicious code, indicating that the malicious payload was intentionally or unintentionally included within the legitimate software package. The maintainers responded by unpublishing version 1.17.3 and recommending users to transition to version 1.17.2 or follow the Prebid.js 9 release notes to move away from deprecated workflows that rely on dynamic referencing of PUC. The CVSS 4.0 base score of 9.3 reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits have been observed in the wild yet, the widespread use of PUC in advertising technology stacks makes this vulnerability a significant risk, especially for organizations relying on dynamic ad content rendering. Attackers could leverage this vulnerability to inject crypto-mining malware or other malicious scripts, potentially leading to resource exhaustion, data leakage, or broader network compromise.

Potential Impact

For European organizations, the impact of this vulnerability is substantial due to the extensive use of Prebid.js and its Universal Creative module in digital advertising ecosystems across Europe. Compromise through this vulnerability could lead to unauthorized cryptocurrency mining, resulting in degraded system performance and increased operational costs. More critically, the embedded malicious code could serve as a foothold for further attacks, including data exfiltration or lateral movement within corporate networks. Given the GDPR regulatory environment, any data leakage or compromise could also result in significant legal and financial penalties. Organizations involved in digital marketing, media, and e-commerce are particularly at risk, as they often integrate such ad technologies directly into their web platforms. The lack of required authentication and user interaction for exploitation increases the risk of automated widespread attacks. Additionally, the use of popular CDNs like jsdelivr to host the compromised version increases the attack surface, potentially affecting numerous organizations simultaneously. The reputational damage from serving malicious ads or compromised content could also be severe, impacting customer trust and business continuity.

Mitigation Recommendations

European organizations should immediately audit their use of Prebid Universal Creative, specifically checking for version 1.17.3 or any dynamic references to the latest version that might resolve to the compromised release. They should transition to version 1.17.2 or follow the guidance in the Prebid.js 9 release notes to adopt supported workflows that do not rely on deprecated or dynamically referenced versions of PUC. It is critical to implement strict dependency management practices, including locking package versions and verifying package integrity using cryptographic signatures or checksums. Organizations should also monitor their CDN usage to ensure that no compromised versions are being served from third-party hosts like jsdelivr. Deploying runtime security controls such as Content Security Policy (CSP) headers can help mitigate the impact by restricting the execution of unauthorized scripts. Additionally, network-level monitoring for unusual outbound connections or resource usage spikes can help detect potential crypto-mining activity. Regular security awareness training for developers and IT staff on supply chain risks and secure package management is recommended to prevent similar issues in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-08T16:19:26.171Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c0abb29ed239a66bad7807

Added to database: 9/9/2025, 10:35:30 PM

Last enriched: 9/9/2025, 10:50:24 PM

Last updated: 9/10/2025, 12:33:08 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats