← Back
Malicious Package
CVE-2025-63703 critical CVSS 9.8

Vulnerability in npm (CVE-2025-63703)

Summary

vulnerability in npm (CVE-2025-63703). Successful exploitation can lead to full system takeover.

AI summary openai / gpt-4o

A flaw has been discovered in version 1.0.6 of the npm package 'parse-ini,' where attackers could execute malicious code affecting other programs. This critical issue arises from the ability to manipulate the package through specific configuration files, potentially causing unwanted programs or data leaks. Companies are urged to immediately discontinue use of this version and update to a secure version as soon as it becomes available.
The vulnerability manifests as Prototype Pollution in parse-ini's index.js(), where improper prototype modifications are possible. Attackers can exploit this via malicious .ini files to pollute the global object prototypes, potentially executing arbitrary code. The affected version is up to 1.0.6. Specifically, an ini file with a [__proto__] section triggers this issue due to lack of proper checks. As a workaround, strictly validate ini file input or apply a provided patch when available.
❓ What is the problem
Prototype Pollution in npm package parse-ini's index.js().
📍 Affected scope
In index.js() method of parse-ini version 1.0.6.
🔥 Severity
Critical, allowing potential code execution and denial of service.
🔧 How to fix
Patch or upgrade to a fixed version when available, meanwhile validate ini inputs.
🛡️ Workaround
Validate .ini file inputs to prevent malicious entries.
🔍 Detection
Monitor for usage of global.__proto__ in application logs.

Related past incidents Similar incidents extracted from past CVEs

Similar Prototype Pollution issue in lodash package, allowing property modification.
Prototype Pollution in yargs-parser affecting object prototype pollution.
Deep Merge utility users faced Prototype Pollution vulnerability leading to arbitrary code execution.

If this happens at your company Expected impact per business scenario

📌 利用企業でparse-iniを用いて設定を行っている場合
攻撃者がシステム全体にわたって悪意あるプロパティを展開し、予期しない動作を引き起こす可能性がある。
📌 npmパッケージが広く使用されている開発エコシステム
セキュリティが脆弱な状態でパッケージが他のプロジェクトで再利用され、連鎖的に影響を拡大する可能性がある。
📌 クラウドベースのアプリケーションでの利用
攻撃者がクラウドリソースを悪用し、サービス拒否アタックを仕掛けることが可能となる。
Recommended action
現行のparse-iniパッケージの使用を停止し、セキュリティ更新が行われ次第、すぐに適用する。

Response Actions (7 steps)

Concrete steps and command examples for SOC/SRE teams to execute in order

  1. 1
    Identify exposure identify
    Audit SBOM/dependencies for affected components.

    依存マニフェストで影響コンポーネントを特定する。

  2. 7
    Post-deployment verification verify
    Confirm patched version is live in production

    パッチ適用後、ステージングで PoC または同等の悪用パターンを再現して脆弱性が閉じたことを確認。本番では Step 3 と同じログクエリでアラート再発が無いか継続監視。

References

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →