mal-2025-6020
Vulnerability from ossf_malicious_packages

Malicious code in is (npm)


-= Per source details. Do not edit below this line.=-

Source: google-open-source-security (a1baf574e6278b3c20c30fdd7875414ed04c1a695eb226fd43328004c6916873)

"is" had unauthorized new versions published that contained malicious obfuscated code via account compromise.




{
  "affected": [
    {
      "package": {
        "ecosystem": "npm",
        "name": "is"
      },
      "versions": [
        "3.3.1",
        "5.0.0"
      ]
    }
  ],
  "database_specific": {
    "malicious-packages-origins": [
      {
        "import_time": "2025-07-22T07:14:58.657738Z",
        "modified_time": "2025-07-22T07:14:14Z",
        "sha256": "a1baf574e6278b3c20c30fdd7875414ed04c1a695eb226fd43328004c6916873",
        "source": "google-open-source-security",
        "versions": [
          "3.3.1",
          "5.0.0"
        ]
      }
    ]
  },
  "details": "\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: google-open-source-security (a1baf574e6278b3c20c30fdd7875414ed04c1a695eb226fd43328004c6916873)\n\"is\" had unauthorized new versions published that contained malicious\nobfuscated code via account compromise.\n",
  "id": "MAL-2025-6020",
  "modified": "2025-07-22T07:14:14Z",
  "published": "2025-07-22T07:14:14Z",
  "references": [
    {
      "type": "FIX",
      "url": "https://github.com/enricomarino/is/commit/0fe137a5946e4ecb0e649bd7dea48d5415a242fc"
    }
  ],
  "schema_version": "1.5.0",
  "summary": "Malicious code in is (npm)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…