mal-2025-52202
Vulnerability from ossf_malicious_packages
Published
2025-11-10 04:40
Modified
2025-11-10 04:40
Summary
Malicious code in mahesa-bubursumsum45-sluey (npm)
Details
-= Per source details. Do not edit below this line.=-
Source: amazon-inspector (055fc16b2c52c7b3e4eaacb0fd9232e0c2f8b7f492c622d21673e8f1ee589758)
This package appears to be part of the tea.xyz token reward campaign that flooded npm. These packages typically contain autopublish scripts (auto.js, autopublish.js, autopublish2.js, autopublish3.js) designed to automatically generate and publish derivative packages with randomized names to inflate developer reputation scores for tea protocol token rewards. The malicious payload modifies package.json to remove private flags, changes version numbers, generates random Indonesian-themed package names, and continuously republishes variants to pollute the npm registry.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "mahesa-bubursumsum45-sluey"
},
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "SEMVER"
}
]
}
],
"credits": [
{
"contact": [
"actran@amazon.com"
],
"name": "Amazon Inspector",
"type": "FINDER"
}
],
"database_specific": {
"malicious-packages-origins": [
{
"import_time": "2025-11-10T04:43:24.788605867Z",
"modified_time": "2025-11-10T04:40:39Z",
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"sha256": "055fc16b2c52c7b3e4eaacb0fd9232e0c2f8b7f492c622d21673e8f1ee589758",
"source": "amazon-inspector"
}
]
},
"details": "\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: amazon-inspector (055fc16b2c52c7b3e4eaacb0fd9232e0c2f8b7f492c622d21673e8f1ee589758)\nThis package appears to be part of the tea.xyz token reward campaign that flooded npm. These packages typically contain autopublish scripts (auto.js, autopublish.js, autopublish2.js, autopublish3.js) designed to automatically generate and publish derivative packages with randomized names to inflate developer reputation scores for tea protocol token rewards. The malicious payload modifies package.json to remove private flags, changes version numbers, generates random Indonesian-themed package names, and continuously republishes variants to pollute the npm registry.\n",
"id": "MAL-2025-52202",
"modified": "2025-11-10T04:40:39Z",
"published": "2025-11-10T04:40:39Z",
"schema_version": "1.5.0",
"summary": "Malicious code in mahesa-bubursumsum45-sluey (npm)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…