How to ensure you are not vulnerable to the debug / chalk supply chain attack that took place yesterday #5065
boutell
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
As many of you may have read, a supply chain attack against a number of popular npm packages succeeded yesterday:
https://thehackernews.com/2025/09/20-popular-npm-packages-with-2-billion.html
For a 2-hour period yesterday morning (US Eastern), anyone installing the latest version of these packages unknowingly installed code that would attempt to steal funds from cryptocurrency wallets under certain circumstances.
However, this vulnerability applied only:
Neither of these circumstances normally applies to ApostropheCMS.
However, in an abundance of caution, we advise you to update your project's dependencies today, test your site or application and redeploy to all public environments:
In our own tests, a fresh install of apostrophecms with a large number of our optional packages shows no sign of the issue after following these steps.
If you would prefer to avoid this, or just make doubly sure afterwards, you can check your existing build on your production server:
Beta Was this translation helpful? Give feedback.
All reactions