If you are using Axios in your projects, stop for 2 minutes and check your installed version. Two malicious Axios versions were recently published to npm after an attacker gained access to a maintainer’s credentials. The compromised versions are: 1. axios@1.14.1 2. axios@0.30.4 These versions secretly installed another package: < plain-crypto-js@4.2.1 > That package contained a Remote Access Trojan (RAT). What makes this attack scary is that after installation, it cleaned itself up. So even if you later checked: * node_modules * npm audit * package.json * installed package files …everything could look completely normal. If your project, local machine, or CI/CD pipeline installed one of these versions, your environment may have been compromised. Run these commands right now: * npm ls axios * npm ls plain-crypto-js If you find either affected version, immediately: * rm -rf node_modules package-lock.json * npm install axios@latest Also rotate: * API keys * .env secrets * JWT secrets * npm tokens * SSH keys * CI/CD credentials As frontend developers, we often trust npm packages because they are used by millions of projects. But this incident is a reminder that even the most popular libraries can become a target. Always: * lock your package versions * review dependency changes * enable 2FA on npm * avoid blindly using ^ in critical packages A single npm install can sometimes become a security issue. Stay safe and check your projects today. hashtag #javascript hashtag #reactjs hashtag #nodejs hashtag #frontenddevelopment hashtag #webdevelopment hashtag #axios hashtag #cybersecurity hashtag #npm hashtag #developers hashtag #programming
Compromised Axios Versions: Check Your Projects Now
More Relevant Posts
-
The widely used Axios npm package, a JavaScript library that enables applications to make HTTP/S requests and is included as a dependency in millions of applications, was compromised in a supply chain attack on March 31, 2026 (UTC).
To view or add a comment, sign in
-
The widely used Axios npm package, a JavaScript library that enables applications to make HTTP/S requests and is included as a dependency in millions of applications, was compromised in a supply chain attack on March 31, 2026 (UTC).
To view or add a comment, sign in
-
Most developers blindly run: 👉 npm install But very few stop and think… “What exactly am I installing into my system?” Recently, a popular library (axios) was compromised due to an npm account hijack. Malicious versions were published. And thousands of projects could have been affected before it was taken down. Let that sink in. --- 💡 The problem is not just one library… It’s our habit 👇 - We trust packages without verification - We update dependencies without reading changelogs - We install libraries just to save a few lines of code --- ⚠️ Hard truth: Every dependency you install = You are trusting someone else’s code in your system --- Here’s what I’ve started doing as a Full Stack Developer: ✔ Checking package versions before installing ✔ Avoiding unnecessary dependencies ✔ Reviewing lock files (not just package.json) ✔ Staying updated with ecosystem security issues --- 🚀 Lesson learned: Convenience is great… But security is your responsibility. --- Are you careful with the dependencies you install, or do you just trust npm? #JavaScript #NodeJS #ReactJS #CyberSecurity #WebDevelopment #FullStackDeveloper #OpenSource #SoftwareEngineering
To view or add a comment, sign in
-
This might be the BIGGEST npm hack of 2026 If you are a developer using JavaScript, Node.js, or any modern web framework, you probably know about axios, a hugely popular HTTP client with over 100 MILLION weekly downloads. It was recently compromised. A maintainer’s account was hacked, and two malicious versions of axios were published directly to npm. Instead of hacking Axios's core code or its transitive dependencies, the attacker slipped in a custom-built, hidden dependency called plain-crypto-js. When developers or CI pipelines ran npm install, a double-obfuscated Remote Access Trojan (RAT) was deployed via a post-install hook. 👉 On macOS, it used AppleScript to fingerprint the system and beacon back to a Command and Control (C2) server. 👉 On Windows & Linux, a Python RAT launched as an orphaned background process. This allowed complete Remote Code Execution (RCE) on thousands of unique developer machines and CI/CD environments before the packages were removed. This teaches us about importance of lockfiles. Deleting your lock file and running a fresh npm install just because a build broke is a massive security risk. Lock files ensure that your dependency tree remains locked down exactly as intended. If you use lock files properly, supply chain attacks like this have minimum impact. Also stop living on the bleeding edge. Unless a new release patches a specific bug or security issue you need, avoid randomly updating packages the moment they drop. Give it at least 7–10 days for the community and security scanners to catch potential backdoors before bumping your versions. Security is everyone's job, whether you are a Frontend Developer, Backend Dev, or DevOps Engineer. Watch my full breakdown on youtube (link below)
To view or add a comment, sign in
-
-
🚨 Axios NPM Supply Chain Attack — A Wake-Up Call for Developers Recently, the JavaScript ecosystem witnessed a serious security incident involving Axios, one of the most widely used HTTP libraries. 📅 Around March 30–31, 2026, attackers compromised the npm publishing access and released malicious versions of Axios: axios@1.14.1 axios@0.30.4 These versions included a hidden dependency that deployed a Remote Access Trojan (RAT) — potentially allowing attackers to: 🔐 Access sensitive environment variables 🧑💻 Execute remote commands 📡 Exfiltrate API keys and tokens ⚠️ Important Clarification This was NOT a flaw in Axios itself, but a supply chain attack targeting the distribution layer (npm). 🛠️ What should developers do? ✅ Check your project dependencies: npm list axios ✅ If affected versions were used: Rotate all API keys, tokens, and secrets Reinstall dependencies (clean install) Redeploy your application Assume possible compromise and investigate logs ✅ Upgrade immediately to a safe/latest version: npm install axios@latest 🧠 Key Takeaways Even trusted libraries can become attack vectors Always lock dependency versions Monitor supply chain security (npm, GitHub, CI/CD) Security is not optional — it’s part of development 💬 Have you checked your projects yet? #CyberSecurity #JavaScript #Axios #NPM #SupplyChainAttack #WebDevelopment #InfoSec #Developers
To view or add a comment, sign in
-
-
Axios Supply Chain Attack – What It Means for My Project "Social Media Automation System" Recently, the widely used JavaScript HTTP client Axios was compromised in a supply chain attack via npm. Malicious versions ("1.14.1" and "0.30.4") included a hidden dependency that deployed a Remote Access Trojan (RAT) during installation. Why this matters: As a Node.js developer working on an automation system, this kind of vulnerability poses a serious risk—unauthorized access, data leaks, and full system compromise can happen without any changes to my actual code. What I did immediately: - Audited my dependencies - Identified the affected Axios version - Uninstalled the compromised package - Reinstalled the latest secure version - Cleaned and rebuilt my environment Key takeaway: Your biggest security risk isn’t always your code—it’s your dependencies. Regular audits and staying updated on ecosystem vulnerabilities are non-negotiable. #NodeJS #ffmpeg #OpenSource #JavaScript #WebDevelopment #DevOps #SoftwareEngineering
To view or add a comment, sign in
-
-
Dear Ruby devs, if you haven't yet enabled MFA for rubygems then it's time to do now in order to avoid supply chain attack that happened to Axios(the popular http client for javascript) a few weeks ago. Thanks to thoughtbot for writing this article, https://lnkd.in/gsr5HaGS
To view or add a comment, sign in
-
🚀 New Article Published I recently worked on stabilizing a legacy Angular application that hadn’t been updated in years. What started as a simple security fix turned into a full debugging journey: • 47 npm vulnerabilities • Angular Material errors • Infinite recursion crashes • Broken imports • TypeScript configuration issues Instead of rewriting the app, I focused on understanding the problems and fixing them step-by-step. In this article I share the entire troubleshooting journey and the lessons learned while bringing the app back to life. 📖 Read the full article on Medium: https://lnkd.in/gYwcieeK
To view or add a comment, sign in
-
-
🚨 High Risk Vulnerability Alert 🚨 Paperclip, a Node.js server and React UI, has a critical vulnerability (CVE-2026-41208) that allows an attacker to execute arbitrary OS commands on the server host. This is due to a privilege escalation flaw in the /agents/:id API endpoint. This vulnerability highlights the importance of secure API design and the risks associated with Broken Function Level Authorization. Stay safe and update to @paperclipai/server version 2026.416.0 to fix the issue. #Paperclip #Nodejs #React #APIsecurity #OWASP #CVE202641208 https://lnkd.in/gjPwBitH
To view or add a comment, sign in
Explore related topics
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development
👍