cdn-icon-fetch@1.0.1 vulnerabilities

A module to fetch icons from a CDN.

Direct Vulnerabilities

Known vulnerabilities in the cdn-icon-fetch package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Embedded Malicious Code

cdn-icon-fetch is a Malicious package.

Affected versions of this package are vulnerable to Embedded Malicious Code. Once this package is installed and executed, it downloads a Javascript file from a cdn-static-server.vercel.app URL, which appears to be an image hosting site. However, by using a specific custom header, as described in the library, the JavaScript file is downloaded as a first-stage loader. This loader subsequently downloads a .npl file, which acts as a second-stage loader written in Python. Ultimately, a third Python file, which is the actual payload and referenced in a specific Medium article, is executed.

How to fix Embedded Malicious Code?

Avoid using cdn-icon-fetch altogether.

*