{"id":"MAL-2026-2462","summary":"Malicious code in strapi-plugin-form (npm)","details":"strapi-plugin-form is a malicious npm package disguised as a Strapi CMS plugin. On install, it runs a postinstall script that executes an 11-phase attack: stealing .env files, environment variables, Strapi configuration, private keys, Redis data, Docker/Kubernetes secrets, and network topology. It then opens a polling C2 loop that accepts and executes arbitrary shell commands from a remote server.\n\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: amazon-inspector (1465a761c8f0823915379a8b9c75fcf315835c659bb200e92a450247efea4f6d)\nThe package strapi-plugin-form was found to contain malicious code.\n","modified":"2026-04-07T14:56:46.298784Z","published":"2026-04-03T17:26:57Z","database_specific":{"malicious-packages-origins":[{"import_time":"2026-04-07T14:39:11.082743016Z","ranges":[{"events":[{"introduced":"0"}],"type":"SEMVER"}],"sha256":"1465a761c8f0823915379a8b9c75fcf315835c659bb200e92a450247efea4f6d","source":"amazon-inspector","modified_time":"2026-04-07T14:24:50Z"}]},"references":[{"type":"REPORT","url":"https://safedep.io/malicious-npm-strapi-plugin-events-c2-agent/"}],"affected":[{"package":{"name":"strapi-plugin-form","ecosystem":"npm","purl":"pkg:npm/strapi-plugin-form"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/strapi-plugin-form/MAL-2026-2462.json"}}],"schema_version":"1.7.5","credits":[{"name":"Amazon Inspector","contact":["actran@amazon.com"],"type":"FINDER"},{"name":"SafeDep","contact":["https://safedep.io"],"type":"FINDER"}]}