MAL-2026-2463

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/strapi-plugin-guardarian-ext/MAL-2026-2463.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-2463
Published
2026-04-03T19:10:23Z
Modified
2026-04-03T19:37:02.242500Z
Summary
Malicious code in strapi-plugin-guardarian-ext (npm)
Details

strapi-plugin-guardarian-ext is a malicious npm package disguised as a Strapi CMS plugin. On install, it runs a postinstall script that executes an 11-phase attack: stealing .env files, environment variables, Strapi configuration, private keys, Redis data, Docker/Kubernetes secrets, and network topology. It then opens a polling C2 loop that accepts and executes arbitrary shell commands from a remote server.

Database specific
{
    "malicious-packages-origins": null
}
References
Credits

Affected packages

npm / strapi-plugin-guardarian-ext

Package

Name
strapi-plugin-guardarian-ext
View open source insights on deps.dev
Purl
pkg:npm/strapi-plugin-guardarian-ext

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/strapi-plugin-guardarian-ext/MAL-2026-2463.json"