MAL-2026-2462

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/strapi-plugin-form/MAL-2026-2462.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-2462
Published
2026-04-03T17:26:57Z
Modified
2026-04-03T19:32:41.290386Z
Summary
Malicious code in strapi-plugin-form (npm)
Details

strapi-plugin-form is a malicious npm package disguised as a Strapi CMS plugin. On install, it runs a postinstall script that executes an 11-phase attack: stealing .env files, environment variables, Strapi configuration, private keys, Redis data, Docker/Kubernetes secrets, and network topology. It then opens a polling C2 loop that accepts and executes arbitrary shell commands from a remote server.

Database specific
{
    "malicious-packages-origins": null
}
References
Credits

Affected packages

npm / strapi-plugin-form

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/strapi-plugin-form/MAL-2026-2462.json"