MAL-2026-3749

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/@webapp-next/store/MAL-2026-3749.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-3749
Published
2026-05-14T19:25:34Z
Modified
2026-05-15T07:52:27.858776Z
Summary
Malicious code in @webapp-next/store (npm)
Details

-= Per source details. Do not edit below this line.=-

Source: amazon-inspector (cbad3803cdda40845fe2aa64e0963b9293f9ee523b3f9205a354da2ae1e317bf)

package.json declares "preinstall": "node index.js", which runs automatically on npm install. index.js collects os.hostname(), os.platform(), os.arch(), os.homedir(), os.userInfo() (username, uid, gid, shell), OS release/memory/CPU info, process.cwd(), and the output of shell commands whoami and id, then POSTs the aggregated JSON to https://oia2jeijtfmt053ynp686t5riioac00p.oastify.com/testbydext. The destination is a Burp Suite Collaborator out-of-band interaction subdomain controlled by the attacker. The package has no legitimate functionality — index.js contains only the exfiltration payload, and package.json carries empty author/description fields under a scope (@webapp-next) that resembles a legitimate namespace, consistent with a dependency-confusion lure.

Database specific
{
    "malicious-packages-origins": [
        {
            "sha256": "caf033fac1ae50b98e1a222c76831e7012e140234a28dd7e8d0a41a55cf388f7",
            "import_time": "2026-05-15T07:37:20.027681785Z",
            "modified_time": "2026-05-15T02:51:07Z",
            "versions": [
                "91.1.0"
            ],
            "id": "IN-MAL-2026-002798",
            "source": "amazon-inspector"
        },
        {
            "sha256": "cbad3803cdda40845fe2aa64e0963b9293f9ee523b3f9205a354da2ae1e317bf",
            "import_time": "2026-05-15T07:37:18.661452149Z",
            "modified_time": "2026-05-14T19:25:34Z",
            "versions": [
                "91.1.0"
            ],
            "id": "IN-MAL-2026-002735",
            "source": "amazon-inspector"
        }
    ]
}
References
Credits

Affected packages

npm / @webapp-next/store

Package

Name
@webapp-next/store
View open source insights on deps.dev
Purl
pkg:npm/%40webapp-next/store

Affected ranges

Affected versions

91.*
91.1.0

Database specific

indicators
{
    "evidence_files": [
        {
            "sha256": "5e497bd84896699086b7444a0e8180f761affd89b916fa67093e9dbb4d231558",
            "path": "index.js",
            "tlsh": "c2515fc516f65a251ba7b8494a4f9002b327e0033649ee55bfcc8740af9837c97f0af2"
        },
        {
            "sha256": "0ad68eede34ba2906eb27bc9cbb196c5e58725334360cde0236341ec224ce542",
            "path": "package.json",
            "tlsh": "86d05e385e21653325c50296482b988672a18e2f09047c0877cb582c528e67798fb35c"
        }
    ],
    "package_integrity": [
        {
            "hashes": {
                "sha1": "516f3f665050324eef513a15a26cebb6edbc8a59",
                "sha512_sri": "sha512-DHkuKgahyrLbuOlwGTkT7OJdRcj0nLvMAvcTvOG09xLYn+eMgGUdrXOrRdnxiahUEgtoTGV7sTdGaKXo4BxlZQ=="
            },
            "filename": "store-91.1.0.tgz"
        }
    ]
}
cwes
[
    {
        "description": "The product contains code that appears to be malicious in nature.",
        "cweId": "CWE-506",
        "name": "Embedded Malicious Code"
    },
    {
        "description": "The product contains code that appears to be malicious in nature.",
        "cweId": "CWE-506",
        "name": "Embedded Malicious Code"
    }
]
source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/@webapp-next/store/MAL-2026-3749.json"