color-string is a parser and generator for CSS color strings. On 8 September 2025, the npm publishing account for color-string was taken over after a phishing attack. Version 2.1.1 was published, functionally identical to the previous patch version, but with a malware payload added attempting to redirect cryptocurrency transactions to the attacker's own addresses from within browser environments. Local environments, server environments, command line applications, etc. are not affected. If the package was used in a browser context (e.g. a direct <script> inclusion, or via a bundling tool such as Babel, Rollup, Vite, Next.js, etc.) there is a chance the malware still exists and such bundles will need to be rebuilt. The malware seemingly only targets cryptocurrency transactions and wallets such as MetaMask. npm removed the offending package from the registry over the course of the day on 8 September. On 13 September, the package owner published new patch versions to help cache-bust those using private registries who might still have the compromised version cached. This issue has been resolved in 2.1.2.
History

Wed, 24 Sep 2025 00:15:00 +0000


Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Color-string Project
Color-string Project color-string
Vendors & Products Color-string Project
Color-string Project color-string

Mon, 15 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 19:30:00 +0000

Type Values Removed Values Added
Description color-string is a parser and generator for CSS color strings. On 8 September 2025, the npm publishing account for color-string was taken over after a phishing attack. Version 2.1.1 was published, functionally identical to the previous patch version, but with a malware payload added attempting to redirect cryptocurrency transactions to the attacker's own addresses from within browser environments. Local environments, server environments, command line applications, etc. are not affected. If the package was used in a browser context (e.g. a direct <script> inclusion, or via a bundling tool such as Babel, Rollup, Vite, Next.js, etc.) there is a chance the malware still exists and such bundles will need to be rebuilt. The malware seemingly only targets cryptocurrency transactions and wallets such as MetaMask. npm removed the offending package from the registry over the course of the day on 8 September. On 13 September, the package owner published new patch versions to help cache-bust those using private registries who might still have the compromised version cached. This issue has been resolved in 2.1.2.
Title color-string@2.1.1 contains malware after npm account takeover
Weaknesses CWE-506
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:A/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-09-15T19:10:07.595Z

Updated: 2025-09-15T19:45:39.946Z

Reserved: 2025-09-09T15:23:16.326Z

Link: CVE-2025-59142

cve-icon Vulnrichment

Updated: 2025-09-15T19:45:37.107Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-15T20:15:38.753

Modified: 2025-09-16T12:49:16.060

Link: CVE-2025-59142

cve-icon Redhat

Severity : Important

Publid Date: 2025-09-15T19:10:07Z

Links: CVE-2025-59142 - Bugzilla