CVE-2025-59145
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-09-16
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| npm | color-name | 2.0.1 |
| npm | debug | 4.4.2 |
| npm | color-name | 2.0.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-506 | The product contains code that appears to be malicious in nature. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability involves the npm package 'color-name', which was compromised after a phishing attack on the publishing account. A malicious version 2.0.1 was published containing malware that attempts to redirect cryptocurrency transactions to the attacker's addresses when used in browser environments. Local, server, and command line environments are not affected. Users who included this package in browser contexts may have been exposed to this malware.
How can this vulnerability impact me? :
If you use the 'color-name' package in browser environments, the malware could redirect your cryptocurrency transactions and wallets (such as MetaMask) to the attacker's addresses, potentially causing financial loss. Local or server-side uses are not affected. To mitigate, users should update to version 2.0.2, clear caches, and rebuild browser bundles.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the color-name package to version 2.0.2 or later, completely remove your node_modules directory, clean your package manager's global cache, and rebuild any browser bundles from scratch. If you operate private registries or registry mirrors, purge the offending versions from any caches.