Vulnerability DatabaseGHSA-g2q5-5433-rhrf

GHSA-g2q5-5433-rhrf
JavaScript vulnerability analysis and mitigation

Overview

The npm package 'rc', a configuration loader for applications with approximately 14.2 million weekly downloads, was compromised in November 2021. The malicious versions (1.2.9, 1.3.9, and 2.3.9) were published after attackers gained unauthorized access to the package developer's account. This incident was particularly significant as it affected one of npm's most popular packages (The Record, GitHub Advisory).

Technical details

During installation, the compromised versions executed a suspicious preinstall script that attempted to run compile.js (not present in original versions). The script contained obfuscated JavaScript code that would launch compile.bat, which subsequently downloaded and executed sdd.dll from a malicious domain. The DLL file (SHA256: 26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf) was designed to be loaded using regsvr32.exe -s compile.dll (CERT-EU).

Impact

The malware was designed to perform various malicious activities including stealing passwords from web browsers, VNC clients, FTP clients, and email accounts. Additionally, it was capable of taking screenshots and logging keystrokes. Any computer that had these compromised packages installed or running was considered fully compromised, requiring immediate rotation of all secrets and keys stored on the affected system (GitHub Advisory).

Mitigation and workarounds

Users of affected versions were advised to immediately downgrade to version 1.2.8. The npm security team removed all compromised versions from the registry to prevent further infections. Additionally, it was recommended to remove the package entirely from affected systems and rotate all passwords and secrets from a different, uncompromised computer (GitHub Advisory).

Community reactions

The npm team responded quickly to the incident by temporarily disabling the compromised developer account and actively monitoring for similar activity. The compromise was quickly identified due to the package's widespread use and the fact that it hadn't seen new releases since December 2015, which made the sudden new releases suspicious (The Record).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22787HIGH8.7
  • JavaScriptJavaScript
  • html2pdf.js
NoYesJan 14, 2026
CVE-2026-22820MEDIUM6.3
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22819MEDIUM5.9
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026
GHSA-73rr-hh4g-fpgxLOWN/A
  • JavaScriptJavaScript
  • diff
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management