MAL-2025-48091

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/vercel-v0/MAL-2025-48091.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-48091
Aliases
  • GHSA-52hh-6hxr-wp2p
Published
2025-10-08T07:20:47Z
Modified
2025-10-27T18:09:49Z
Summary
Malicious code in vercel-v0 (npm)
Details

-= Per source details. Do not edit below this line.=-

Source: ghsa-malware (0b3f5d72ec9c31838366e2e5e38f08021d40aa495b4424e97ff5b580a24467d7)

Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

Source: ossf-package-analysis (6efa49ed748d0337df4eecdad26fd12617d30b74bd0bd14f0a7960690a625a5c)

The OpenSSF Package Analysis project identified 'vercel-v0' @ 999.999.6005 (npm) as malicious.

It is considered malicious because:

  • The package communicates with a domain associated with malicious activity.

  • The package executes one or more commands associated with malicious behavior.

Database specific
{
    "malicious-packages-origins": [
        {
            "import_time": "2025-10-08T07:34:44.505754478Z",
            "modified_time": "2025-10-08T07:20:47Z",
            "sha256": "81547f7aa4bb826466aebf919774685cd1be2e1c6fe78b8d287257a7dce53b67",
            "source": "ossf-package-analysis",
            "versions": [
                "999.999.4005"
            ]
        },
        {
            "import_time": "2025-10-08T10:06:55.091277094Z",
            "modified_time": "2025-10-08T09:53:40Z",
            "sha256": "6efa49ed748d0337df4eecdad26fd12617d30b74bd0bd14f0a7960690a625a5c",
            "source": "ossf-package-analysis",
            "versions": [
                "999.999.6005"
            ]
        },
        {
            "import_time": "2025-10-08T10:38:04.930523801Z",
            "modified_time": "2025-10-08T10:15:43Z",
            "sha256": "4a67cda2cf099581a2da46dca899a8575e03c69e9eb1050a58f4f23e2d982067",
            "source": "ossf-package-analysis",
            "versions": [
                "999.999.9005"
            ]
        },
        {
            "import_time": "2025-10-08T16:07:29.585858964Z",
            "modified_time": "2025-10-08T16:06:44Z",
            "sha256": "cf1fb99edcc7c3160c046b57c252ba6c4fe0d07963e6010d8cc7fc3b1eca0377",
            "source": "ossf-package-analysis",
            "versions": [
                "999.999.12005"
            ]
        },
        {
            "import_time": "2025-10-08T17:05:40.340777502Z",
            "modified_time": "2025-10-08T16:50:47Z",
            "sha256": "52b5dbf811f080c13a6a5b0720b6354caf630b0da0a18835aae74064a09bc9fc",
            "source": "ossf-package-analysis",
            "versions": [
                "999.999.22005"
            ]
        },
        {
            "import_time": "2025-10-09T23:22:26.711060794Z",
            "modified_time": "2025-10-09T22:46:28Z",
            "sha256": "0b3f5d72ec9c31838366e2e5e38f08021d40aa495b4424e97ff5b580a24467d7",
            "source": "ghsa-malware",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "SEMVER"
                }
            ],
            "id": "GHSA-52hh-6hxr-wp2p"
        },
        {
            "import_time": "2025-10-27T18:09:07.940792368Z",
            "modified_time": "2025-10-23T19:50:15Z",
            "sha256": "3240c459f6e11fc3b8024ddb494e4f7cd126ad004b97ac28587a9058929b5fe1",
            "source": "reversing-labs",
            "versions": [
                "999.999.999",
                "999.999.1001",
                "999.999.2005",
                "999.999.3005",
                "999.999.4005",
                "999.999.5005",
                "999.999.6005",
                "999.999.8005",
                "999.999.9005",
                "999.999.9705",
                "999.999.10005",
                "999.999.11005",
                "999.999.12005",
                "999.999.15005",
                "999.999.20005",
                "999.999.21005",
                "999.999.22005",
                "999.999.23005",
                "999.999.25005",
                "999.999.29005",
                "999.999.33005"
            ],
            "id": "RLMA-2025-05546"
        }
    ]
}
References
Credits

Affected packages

npm / vercel-v0

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

999.*
999.999.999
999.999.1001
999.999.2005
999.999.3005
999.999.4005
999.999.5005
999.999.6005
999.999.8005
999.999.9005
999.999.9705
999.999.10005
999.999.11005
999.999.12005
999.999.15005
999.999.20005
999.999.21005
999.999.22005
999.999.23005
999.999.25005
999.999.29005
999.999.33005

Database specific

cwes
[
    {
        "cweId": "CWE-506",
        "name": "Embedded Malicious Code",
        "description": "The product contains code that appears to be malicious in nature."
    }
]
source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/vercel-v0/MAL-2025-48091.json"