mal-2025-191421
Vulnerability from ossf_malicious_packages
Published
2025-11-25 00:16
Modified
2025-12-24 10:09
Summary
Malicious code in selenium-session (npm)
Details
-= Per source details. Do not edit below this line.=-
Source: amazon-inspector (9ecd0e6dc81b318ff25ac39f8955edd9409fd4ffec088409a60da0570a050691)
The package selenium-session was found to contain malicious code.
Source: google-open-source-security (a5e6b3327c7ae84733f196eb2c1c230fdabd391aea3616977cefb5b555238cab)
This package was compromised by the Sha1-Hulud: The Second Coming NPM worm. The malicious payload steals tokens and credentials and publishes them to GitHub. The worm will propogate itself to NPM packages the user owns and establish persistence is a GitHub action. The package may also destroy the user's home directory.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "selenium-session"
},
"versions": [
"1.0.5"
]
}
],
"credits": [
{
"contact": [
"actran@amazon.com"
],
"name": "Amazon Inspector",
"type": "FINDER"
},
{
"contact": [
"https://www.reversinglabs.com"
],
"name": "ReversingLabs",
"type": "FINDER"
}
],
"database_specific": {
"malicious-packages-origins": [
{
"import_time": "2025-11-25T00:17:35.118783Z",
"modified_time": "2025-11-25T00:16:49Z",
"sha256": "a5e6b3327c7ae84733f196eb2c1c230fdabd391aea3616977cefb5b555238cab",
"source": "google-open-source-security",
"versions": [
"1.0.5"
]
},
{
"import_time": "2025-12-01T04:26:49.225098416Z",
"modified_time": "2025-12-01T04:11:22Z",
"sha256": "9ecd0e6dc81b318ff25ac39f8955edd9409fd4ffec088409a60da0570a050691",
"source": "amazon-inspector",
"versions": [
"1.0.5"
]
},
{
"id": "RLMA-2025-06475",
"import_time": "2025-12-24T10:07:27.468280428Z",
"modified_time": "2025-12-23T08:30:01Z",
"sha256": "3f0d38854c965bbf66a31908c2d726425f85096ae124af242126b9158caefefc",
"source": "reversing-labs",
"versions": [
"1.0.5"
]
}
]
},
"details": "\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: amazon-inspector (9ecd0e6dc81b318ff25ac39f8955edd9409fd4ffec088409a60da0570a050691)\nThe package selenium-session was found to contain malicious code.\n\n## Source: google-open-source-security (a5e6b3327c7ae84733f196eb2c1c230fdabd391aea3616977cefb5b555238cab)\nThis package was compromised by the Sha1-Hulud: The Second Coming NPM worm.\nThe malicious payload steals tokens and credentials and publishes them to\nGitHub. The worm will propogate itself to NPM packages the user owns and\nestablish persistence is a GitHub action.\nThe package may also destroy the user\u0027s home directory.\n",
"id": "MAL-2025-191421",
"modified": "2025-12-24T10:09:30Z",
"published": "2025-11-25T00:16:49Z",
"references": [
{
"type": "WEB",
"url": "https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains"
},
{
"type": "WEB",
"url": "https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack"
},
{
"type": "WEB",
"url": "https://www.stepsecurity.io/blog/sha1-hulud-the-second-coming-zapier-ens-domains-and-other-prominent-npm-packages-compromised"
},
{
"type": "WEB",
"url": "https://checkmarx.com/zero-post/shai-huluds-second-coming-npm-malware-attack-evolved"
},
{
"type": "WEB",
"url": "https://www.veracode.com/blog/return-of-the-shai-hulud-worm"
},
{
"type": "ARTICLE",
"url": "https://www.reversinglabs.com/blog/another-shai-hulud-npm-worm-is-spreading-heres-what-you-need-to-know"
},
{
"type": "WEB",
"url": "https://www.koi.ai/incident/live-updates-sha1-hulud-the-second-coming-hundred-npm-packages-compromised"
},
{
"type": "WEB",
"url": "https://research.jfrog.com/post/shai-hulud-the-second-coming"
}
],
"schema_version": "1.7.4",
"summary": "Malicious code in selenium-session (npm)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…