Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-45321

Malware in @tanstack/* packages exfiltrates cloud credentials, GitHub tokens, and SSH keys
Back to all
CVE

CVE-2026-45321

Malware in @tanstack/* packages exfiltrates cloud credentials, GitHub tokens, and SSH keys

Summary

On 2026-05-11, between approximately 19:20 and 19:26 UTC, 84 malicious versions across 42 @tanstack/* packages were published to the npm registry. The publishes were authenticated via the legitimate GitHub Actions OIDC trusted-publisher binding for TanStack/router, but the publish workflow itself was not modified. The attacker chained three known vulnerability classes — a pullrequesttarget "Pwn Request" misconfiguration, GitHub Actions cache poisoning across the fork↔base trust boundary, and runtime memory extraction of the OIDC token from the Actions runner process — to publish credential-stealing malware under a trusted identity.

Each affected package received exactly two malicious versions, published a few minutes apart.

Impact

A user installing any affected version executes a payload (~2.3 MB obfuscated router_init.js) at install time that:

  • Harvests credentials from common locations:
  • AWS instance metadata (IMDS) and Secrets Manager
  • GCP metadata service
  • Kubernetes service-account tokens
  • HashiCorp Vault tokens
  • ~/.npmrc (npm tokens)
  • GitHub tokens (env vars, gh CLI config, .git-credentials)
  • SSH private keys (~/.ssh/)
  • Exfiltrates harvested data over the Session/Oxen messenger file-upload network (filev2.getsession.orgseed{1,2,3}.getsession.org). This is end-to-end encrypted with no attacker-controlled C2, so blocking by IP or domain is the only network mitigation.
  • Enumerates packages that the victim maintains via registry.npmjs.org/-/v1/search?text=maintainer:<user> and republishes them with the same injection, propagating the compromise across npm.

Any developer or CI environment that ran npm installpnpm install, or yarn install against an affected version on 2026-05-11 should be considered compromised. All credentials accessible to the install process should be rotated immediately. Cloud audit logs should be reviewed for activity originating from the affected hosts during and after the install window.

Detection

Inspect the published manifest of any pinned @tanstack/* version. Malicious manifests contain this exact optionalDependencies entry:

"optionalDependencies": {
  "@tanstack/setup": "github:tanstack/router#79ac49eedf774dd4b0cfa308722bc463cfe5885c"
}

To check a version without running install scripts:

npm pack @tanstack/<name>@<version>   # downloads tarball; does NOT execute lifecycle scripts
tar -xzf *.tgz
grep -A3 optionalDependencies package/package.json
ls -la package/router_init.js   # malicious payload, ~2.3 MB, present at package root

The payload file router_init.js is approximately 2.3 MB of obfuscated JavaScript. It is placed at the tarball root and is intentionally not declared in the package's "files" array, so it does not appear in the package's documented contents.

Mechanism

@tanstack/setup is not a real package on the npm registry. The github:tanstack/router#79ac49ee... specifier resolves to an orphan commit pushed to a fork in the tanstack/router GitHub fork network. GitHub serves commits across the entire fork network for git-URL dependencies, so the attacker did not require write access to TanStack/router itself — only the ability to fork and push to their own fork.

When npm processes the optional dependency, it:

  1. Fetches the orphan commit from the fork network.
  2. Installs the commit's declared dependencies (which include a real bun binary).
  3. Runs the commit's prepare lifecycle script: bun run tanstack_runner.js && exit 1. The trailing exit 1 causes the optional install to fail, after which npm silently discards it — leaving no node_modules trace.
  4. The tanstack_runner.js script in turn executes router_init.js from the host package's tarball.

Patches

Affected versions are being deprecated on npm with a SECURITY: notice. Where npm policy allows (no existing third-party dependents), affected versions are also being unpublished. The npm security team has been engaged to pull tarballs server-side for versions that cannot be unpublished.

Clean follow-up releases are being prepared. Update to the patched version listed in the affected-products table for each package, then reinstall from a clean lockfile.

Workarounds

Until clean follow-up releases are available:

  • Pin every @tanstack/* dependency to a known-good version published before 2026-05-11 19:00 UTC. The last known-good version for most affected packages was published on 2026-03-15.
  • Delete node_modules and the lockfile, then reinstall to ensure no transitive dependency resolves to a malicious version.
  • Configure npm to skip lifecycle scripts on install (npm config set ignore-scripts true) as a temporary defense-in-depth measure.
  • For CI, audit any pipeline that ran install against @tanstack/* between 19:20 and 19:30 UTC on 2026-05-11. Treat the runner as compromised and rotate any secrets it had access to.

Indicators of compromise

| Indicator | Value |

|---|---|

| Malicious git ref | github:tanstack/router#79ac49eedf774dd4b0cfa308722bc463cfe5885c |

| Fictitious package name | @tanstack/setup |

| Payload filename | router_init.js (~2.3 MB, package root, undeclared in files) |

| Helper filename in orphan commit | tanstack_runner.js |

| Exfiltration network | filev2.getsession.orgseed1.getsession.orgseed2.getsession.orgseed3.getsession.org |

| Second-stage payload URLs | https://litter.catbox.moe/h8nc9u.jshttps://litter.catbox.moe/7rrc6l.mjs |

| Poisoned cache key | Linux-pnpm-store-6f9233a50def742c09fde54f56553d6b449a535adf87d4083690539f49ae4da11 |

| Publish window (UTC) | 2026-05-11 19:20 — 19:26 |

| Publish mechanism | GitHub Actions OIDC trusted publisher (oidc:db7d6f54-05d5-412b-8a10-e7a8398b303e) |

| Workflow runs | https://github.com/TanStack/router/actions/runs/25613093674 (attempt 4), https://github.com/TanStack/router/actions/runs/25691781302 |

| Attacker GitHub accounts | zblgg (id 127806521), voicproducoes (id 269549300) |

| Attacker fork (renamed to evade detection) | https://github.com/zblgg/configuration |

Credits

  • The security researcher who initially disclosed the vulnerability publicly with detailed analysis at https://github.com/TanStack/router/issues/7383

References

  • Public incident tracking issue: https://github.com/TanStack/router/issues/7383
  • Related research:
  • Adnan Khan, "The Monsters in Your Build Cache: GitHub Actions Cache Poisoning" (May 2024)
  • GitHub Security Lab, "Keeping your GitHub Actions and workflows secure: Preventing Pwn Requests"
  • StepSecurity, "tj-actions/changed-files action is compromised" (March 2025) — the malicious payload reuses this incident's runner-memory extraction technique verbatim

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
9.6
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
C
H
U
-

Related Resources

No items found.

References

https://github.com/TanStack/router/security/advisories/GHSA-g7cv-rxg3-hmpx, https://github.com/TanStack/router/issues/7383, https://github.com/TanStack/router, https://socket.dev/blog/tanstack-npm-packages-compromised-mini-shai-hulud-supply-chain-attack

Severity

9.6

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
9.6
EPSS Probability
0%
EPSS Percentile
0%
Introduced Version
1.166.12,1.161.9,0.0.4,1.154.12,1.169.5,1.166.16,1.166.15,1.167.68,1.166.51,0.0.47,1.166.55,1.166.46,1.167.6,1.166.45,1.167.38,1.168.3,1.161.11,1.166.53,1.167.65,1.166.50,1.166.54,1.168.5,1.169.23,1.167.33,1.166.44,1.166.38,1.161.10,1.167.61,1.161.12,0.0.7,1.154.15,1.169.8,1.166.19,1.166.18,1.167.71,0.0.50,1.166.58,1.166.49,1.167.9,1.166.48,1.167.41,1.168.6,1.161.14,1.166.56,1.166.57,1.168.8,1.169.26,1.167.36,1.166.47,1.166.41,1.161.13,1.167.64
Fix Available
1.166.16,1.161.13,0.0.8,1.154.16,1.169.9,1.166.20,1.166.19,1.167.72,1.166.55,0.0.51,1.166.59,1.166.50,1.167.10,1.166.49,1.167.42,1.168.7,1.161.15,1.166.57,1.167.69,1.166.54,1.166.58,1.168.9,1.169.27,1.167.37,1.166.48,1.166.42,1.161.14,1.167.65

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading