Malicious Package Affecting color-name package, versions >2.0.0


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Attacked

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-COLORNAME-12552903
  • published8 Sept 2025
  • disclosed8 Sept 2025
  • creditUnknown

Introduced: 8 Sep 2025

New Malicious CVE NOT AVAILABLE CWE-506  (opens in a new tab)

How to fix?

Avoid using all malicious instances of the color-name package.

Overview

color-name is a malicious package. This package version contains malicious code that listens for network traffic when run in the context of a browser and focuses on crypto transactions. The malicious code injected to the packages activates a hook whenever a Web3 wallet is present. Once activated the code intercepts and modifies any transaction with ETH value and points it to another address presumably controlled by the attacker. The malicious code also listens for swap/transfer transactions to tamper with as well.

Note:

This advisory is under ongoing investigation and can be updated with additional details.

CVSS Base Scores

version 4.0
version 3.1