Embedded Malicious Code Affecting @teale.io/eslint-config package, versions =1.8.9=1.8.10=1.8.11=1.8.12=1.8.13=1.8.14=1.8.15=1.8.16


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Attacked

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-TEALEIOESLINTCONFIG-15709792
  • published20 Mar 2026
  • disclosed19 Mar 2026
  • creditUnknown

Introduced: 19 Mar 2026

New Malicious CVE NOT AVAILABLE CWE-506  (opens in a new tab)

How to fix?

Avoid using all malicious instances of the @teale.io/eslint-config package.

Overview

@teale.io/eslint-config is an A new version of the package

Affected versions of this package are vulnerable to Embedded Malicious Code. The publishing pipeline of this package was compromised as the result of Trivy's GitHub Actions compromise and a malicious versions were released on NPM. They contain malicious code, and its content was NOT yet removed from the official package manager.

A postinstall hook with Python payload was added that actively harvests npm authentication tokens from the victim's machine.

CVSS Base Scores

version 4.0
version 3.1