Compromised Axios Versions: Check Your Projects Now

If you are using Axios in your projects, stop for 2 minutes and check your installed version. Two malicious Axios versions were recently published to npm after an attacker gained access to a maintainer’s credentials. The compromised versions are: 1. axios@1.14.1 2. axios@0.30.4 These versions secretly installed another package: < plain-crypto-js@4.2.1 > That package contained a Remote Access Trojan (RAT). What makes this attack scary is that after installation, it cleaned itself up. So even if you later checked: * node_modules * npm audit * package.json * installed package files …everything could look completely normal. If your project, local machine, or CI/CD pipeline installed one of these versions, your environment may have been compromised. Run these commands right now: * npm ls axios * npm ls plain-crypto-js If you find either affected version, immediately: * rm -rf node_modules package-lock.json * npm install axios@latest Also rotate: * API keys * .env secrets * JWT secrets * npm tokens * SSH keys * CI/CD credentials As frontend developers, we often trust npm packages because they are used by millions of projects. But this incident is a reminder that even the most popular libraries can become a target. Always: * lock your package versions * review dependency changes * enable 2FA on npm * avoid blindly using ^ in critical packages A single npm install can sometimes become a security issue. Stay safe and check your projects today. hashtag #javascript hashtag #reactjs hashtag #nodejs hashtag #frontenddevelopment hashtag #webdevelopment hashtag #axios hashtag #cybersecurity hashtag #npm hashtag #developers hashtag #programming

  • No alternative text description for this image

To view or add a comment, sign in

Explore content categories