Supply Chain Compromise in eslint-config-prettier Affects Multiple Versions
CVE-2025-54313

7.5HIGH

Key Information:

Vendor

Prettier

Vendor
CVE Published:
19 July 2025

Badges

πŸ‘Ύ Exploit ExistsπŸ¦… CISA ReportedπŸ“° News Worthy

What is CVE-2025-54313?

The eslint-config-prettier package has been compromised, with malicious code embedded in versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7. The compromised install.js file executes when the package is installed, resulting in the activation of node-gyp.dll malware on Windows systems. This incident highlights the importance of supply chain security, emphasizing the risks associated with using third-party libraries in development workflows.

CISA has reported CVE-2025-54313

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-54313 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

eslint-config-prettier 8.10.1

eslint-config-prettier 9.1.1

eslint-config-prettier 10.1.6

News Articles

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

CISA added four actively exploited vulnerabilities to its KEV catalog, urging U.S. federal agencies to apply fixes by February 12, 2026.

2 weeks ago

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • πŸ“°

    First article discovered by The Hacker News

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ¦…

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.