← Zuruck zu CVEs
CVE-2025-54313
HIGHCISA KEV7.5
Beschreibung
eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious code for a supply chain compromise. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N
AngriffsvektorNETWORK
KomplexitatHIGH
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht7/19/2025
Zuletzt geandert1/23/2026
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerPrettier
Produkteslint-config-prettier
SchwachstellennamePrettier eslint-config-prettier Embedded Malicious Code Vulnerability
KEV Aufnahmedatum2026-01-22
Behebungsfrist2026-02-12
Ransomware-NutzungUnknown
Betroffene Produkte
alexghr:got-fetchhomarr:homarrmicrosoft:windowsprettier:eslint-config-prettierprettier:eslint-plugin-prettierun-ts:napi-postinstallun-ts:pkgr\/coreun-ts:synckit
Schwachen (CWE)
CWE-506
Referenzen
https://news.ycombinator.com/item?id=44608811(cve@mitre.org)
https://news.ycombinator.com/item?id=44609732(cve@mitre.org)
https://socket.dev/blog/npm-phishing-campaign-leads-to-prettier-tooling-packages-compromise(cve@mitre.org)
https://www.bleepingcomputer.com/news/security/popular-npm-linter-packages-hijacked-via-phishing-to-drop-malware/(cve@mitre.org)
https://www.stepsecurity.io/blog/supply-chain-security-alert-eslint-config-prettier-package-shows-signs-of-compromise(cve@mitre.org)
https://github.com/community-scripts/ProxmoxVE/discussions/6115(af854a3a-2127-422b-91ae-364da2661108)
https://www.endorlabs.com/learn/cve-2025-54313-eslint-config-prettier-compromise----high-severity-but-windows-only(af854a3a-2127-422b-91ae-364da2661108)
https://www.bleepingcomputer.com/news/security/popular-npm-linter-packages-hijacked-via-phishing-to-drop-malware/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-54313(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.