CVE-2024-54134
JavaScript vulnerability analysis and mitigation

Overview

A publish-access account for @solana/web3.js, a widely used JavaScript library for Solana decentralized applications (dapps), was compromised on December 3, 2024. The breach occurred between 3:20pm UTC and 8:25pm UTC, allowing attackers to publish unauthorized and malicious versions (1.95.6 and 1.95.7) of the package. The vulnerability, tracked as CVE-2024-54134, received a CVSS score of 8.3 (High) (GitHub Advisory, NVD).

Technical details

The compromised npm account was used to publish modified versions of the package that contained malicious code designed to exfiltrate private key material. According to security researcher Christophe Tafani-Dereeper, the backdoor in version 1.95.7 added an 'addToQueue' function that exfiltrated private keys through seemingly-legitimate Cloudflare headers (The Register).

Impact

The vulnerability primarily affects projects that directly handle private keys, particularly bots and applications that manage private keys directly. Non-custodial wallets were not affected as they generally do not expose private keys during transactions. According to Mert Mumtaz, CEO of Helius Labs, the financial loss from this incident was estimated at approximately 130,000 USD (The Register).

Mitigation and workarounds

All Solana app developers are advised to upgrade to version 1.95.8. Developers who suspect they might be compromised should rotate any suspect authority keys, including multisigs, program authorities, and server keypairs. The malicious versions (1.95.6 and 1.95.7) have been unpublished from the npm registry (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55182CRITICAL10
  • JavaScriptJavaScript
  • react
NoYesDec 03, 2025
CVE-2025-66401CRITICAL9.8
  • JavaScriptJavaScript
  • mcp-watch
NoNoDec 01, 2025
CVE-2025-66412HIGH8.5
  • JavaScriptJavaScript
  • @angular/compiler
NoYesDec 01, 2025
CVE-2025-66415MEDIUM6.9
  • JavaScriptJavaScript
  • @fastify/reply-from
NoYesDec 01, 2025
CVE-2025-66405MEDIUM6.9
  • JavaScriptJavaScript
  • @portkey-ai/gateway
NoYesDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management