Embeded Malicious Code Affecting @nx/eslint package, versions =21.5.0


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Attacked

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-NXESLINT-12205637
  • published27 Aug 2025
  • disclosed27 Aug 2025
  • creditJahred Hope, Khánh Hoàng

Introduced: 27 Aug 2025

New Malicious CVE NOT AVAILABLE CWE-506  (opens in a new tab)

How to fix?

Avoid using all malicious instances of the @nx/eslint package.

Overview

@nx/eslint is an AI-first build platform that connects everything from your editor to CI. Helping you deliver fast, without breaking things.

Affected versions of this package are vulnerable to Embeded Malicious Code through a malicious postinstall script that triggers a file named telemetry.js. A malicious actor compromised the credentials of one of the maintainers, which allowed the attacker to publish tampered versions of the package to npm.

Malicious Behavior

The malicious code collects sensitive information from the user's system, including cryptocurrency wallets, development credentials like GitHub tokens, npm tokens, and SSH keys. It then exfiltrates this data by creating a public GitHub repository named s1ngularity-repository-* and uploading the stolen information to it. To cover its tracks and disrupt the user's system, the script adds a command to the user's shell configuration files (.bashrc and .zshrc) that attempts to shut down the system every time a new terminal session is opened.

Notes:

  • The malicious versions and their contents have been removed from the official package manager.
  • The maintainers have provided additional information about the compromise in issues 32522 and 32523
  • The maintainers have published IoCs as well as specific remediation advice on GitHub
  • The issue is currently under investigation, and this advisory will be updated as new information is discovered.

CVSS Base Scores

version 4.0
version 3.1