{"id":"MAL-2026-2483","summary":"Malicious code in strapi-plugin-server (npm)","details":"strapi-plugin-server is a malicious npm package disguised as a Strapi CMS plugin. On install, it runs a postinstall script that executes an 11-phase attack: stealing .env files, environment variables, Strapi configuration, private keys, Redis data, Docker/Kubernetes secrets, and network topology. It then opens a polling C2 loop that accepts and executes arbitrary shell commands from a remote server.\n\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: amazon-inspector (f689c25ace6203687560dc542be39490569ca1a4ac27c2f83fda73cbe5dcbf60)\nThe package strapi-plugin-server was found to contain malicious code.\n","modified":"2026-04-07T14:57:03.216503Z","published":"2026-04-03T16:10:54Z","database_specific":{"malicious-packages-origins":[{"source":"amazon-inspector","modified_time":"2026-04-07T14:24:50Z","ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"import_time":"2026-04-07T14:39:19.031719752Z","sha256":"f689c25ace6203687560dc542be39490569ca1a4ac27c2f83fda73cbe5dcbf60"}]},"references":[{"type":"REPORT","url":"https://safedep.io/malicious-npm-strapi-plugin-events-c2-agent/"}],"affected":[{"package":{"name":"strapi-plugin-server","ecosystem":"npm","purl":"pkg:npm/strapi-plugin-server"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/strapi-plugin-server/MAL-2026-2483.json"}}],"schema_version":"1.7.5","credits":[{"name":"Amazon Inspector","contact":["actran@amazon.com"],"type":"FINDER"},{"name":"SafeDep","contact":["https://safedep.io"],"type":"FINDER"}]}