CVE-2026-45321
CRITICALMalware in 42 @tanstack/* packages exfiltrates cloud credentials, GitHub tokens, and SSH keys
Title source: cnaDescription
On 2026-05-11, between approximately 19:20 and 19:26 UTC, 84 malicious versions across 42 @tanstack/* packages were published to the npm registry. The publishes were authenticated via the legitimate GitHub Actions OIDC trusted-publisher binding for TanStack/router, but the publish workflow itself was not modified. The attacker chained three known vulnerability classes — a pull_request_target "Pwn Request" misconfiguration, GitHub Actions cache poisoning across the fork↔base trust boundary, and runtime memory extraction of the OIDC token from the Actions runner process — to publish credential-stealing malware under a trusted identity. Each affected package received exactly two malicious versions, published a few minutes apart.
Exploits (9)
References (4)
Core 4
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/TanStack/router/security/advisories/GHSA-g7cv-rxg3-hmpx
X_Refsource_Misc x_refsource_misc
https://github.com/TanStack/router/issues/7383
X_Refsource_Misc x_refsource_misc
https://tanstack.com/blog/npm-supply-chain-compromise-postmortem
X_Refsource_Misc x_refsource_misc
https://www.stepsecurity.io/blog/mini-shai-hulud-is-back-a-self-spreading-supply-chain-attack-hits-the-npm-ecosystem
Scores
CVSS v3
9.6
EPSS
0.0004
EPSS Percentile
11.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-506
Status
published
Products (50)
@tanstack/arktype-adapter
1.166.12
@tanstack/arktype-adapter
1.166.15
@tanstack/eslint-plugin-router
1.161.12
@tanstack/eslint-plugin-router
1.161.9
@tanstack/eslint-plugin-start
0.0.4
@tanstack/eslint-plugin-start
0.0.7
@tanstack/history
1.161.12
@tanstack/history
1.161.9
@tanstack/nitro-v2-vite-plugin
1.154.12
@tanstack/nitro-v2-vite-plugin
1.154.15
... and 40 more
Published
May 12, 2026
Tracked Since
May 12, 2026