The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-59039

CVE-2025-59039: Prebid Universal Creative Malware Vulnerability

CVE-2025-59039 is a crypto-malware vulnerability in Prebid Universal Creative (PUC) that affected npm users and jsdelivr hosting. This article covers the technical details, affected versions including 1.17.3, and mitigation steps.

Published: April 1, 2026

CVE-2025-59039 Overview

CVE-2025-59039 is a critical software supply chain attack affecting Prebid Universal Creative (PUC), a JavaScript API used to render multiple ad formats. The npm package version 1.17.3 and the latest tag were briefly compromised with crypto-related malware, impacting users who relied on this widely-used advertising technology library. This compromise also affected the extremely popular jsdelivr CDN hosting of the affected file, potentially exposing a significant number of websites and applications to malicious code injection.

Critical Impact

Crypto-related malware was injected into a widely-used npm package affecting ad rendering across potentially thousands of websites using Prebid Universal Creative, including those loading the library from jsdelivr CDN.

Affected Products

  • Prebid Universal Creative (PUC) version 1.17.3 (npm)
  • Prebid Universal Creative (PUC) latest tag (npm)
  • jsdelivr-hosted versions of affected PUC files

Discovery Timeline

  • 2025-09-09 - CVE-2025-59039 published to NVD
  • 2025-09-11 - Last updated in NVD database

Technical Details for CVE-2025-59039

Vulnerability Analysis

This vulnerability represents a supply chain attack classified under CWE-506 (Embedded Malicious Code). The attack involved the injection of crypto-related malware into the Prebid Universal Creative npm package. PUC is a JavaScript API that enables rendering of multiple ad formats and is commonly used in the programmatic advertising ecosystem. The malware was embedded directly into version 1.17.3 of the package, as well as the dynamically-referenced latest version tag.

The attack is particularly severe because PUC is often loaded dynamically from CDN sources like jsdelivr, meaning that websites did not need to explicitly update their dependencies to receive the malicious code—simply pointing to latest or having jsdelivr cache the compromised version was sufficient for exploitation.

Root Cause

The root cause is embedded malicious code (CWE-506) within the npm package distribution. The attackers successfully compromised the package publication process, allowing them to inject crypto-related malware into what appeared to be a legitimate software update. This type of supply chain attack exploits the trust relationship between package maintainers and consumers who automatically pull updates.

Attack Vector

The attack leverages the network-accessible nature of npm package distribution and CDN delivery. When developers or websites reference PUC version 1.17.3 or the latest tag, they unknowingly download and execute the malicious code. The attack requires no authentication and no user interaction—the malicious payload executes automatically when the compromised JavaScript is loaded by a browser.

The attack flow works as follows:

  1. Attacker compromises the npm package publication process
  2. Malicious version 1.17.3 is published to npm registry
  3. jsdelivr and other CDNs cache the compromised file
  4. Websites loading PUC from npm or CDN receive the malicious code
  5. Crypto-related malware executes in visitors' browsers

Detection Methods for CVE-2025-59039

Indicators of Compromise

  • Presence of PUC version 1.17.3 in package.json or package-lock.json files
  • Network requests to unexpected cryptocurrency-related endpoints from ad-serving JavaScript
  • References to the latest version tag for PUC in build configurations or CDN URLs
  • Unusual JavaScript behavior within Prebid ad rendering code

Detection Strategies

  • Audit npm dependencies for PUC version 1.17.3 using npm audit or similar tools
  • Review subresource integrity (SRI) hashes for CDN-loaded JavaScript files
  • Monitor network traffic for anomalous connections originating from ad-rendering code
  • Implement software composition analysis (SCA) to detect compromised packages

Monitoring Recommendations

  • Enable real-time dependency scanning in CI/CD pipelines to detect malicious package versions
  • Configure Content Security Policy (CSP) headers to restrict outbound connections from ad scripts
  • Monitor client-side JavaScript execution for cryptocurrency mining or wallet-related activity
  • Set up alerts for changes to PUC-related dependencies in your projects

How to Mitigate CVE-2025-59039

Immediate Actions Required

  • Immediately audit all projects for references to PUC version 1.17.3 and downgrade to 1.17.2
  • Remove any references to the latest tag and pin to the safe version 1.17.2
  • Clear CDN caches and verify integrity of served JavaScript files
  • Review Prebid.js 9 release notes for guidance on migrating away from the deprecated PUC workflow

Patch Information

The Prebid maintainers have unpublished version 1.17.3 from npm. Users should immediately transition to version 1.17.2, which is not affected by the malware injection. For long-term remediation, the Prebid team recommends reviewing the Prebid.js 9 release notes for suggestions on moving away from the deprecated workflow of using PUC or pointing to dynamic versions.

For additional context on this supply chain attack pattern, see the Sonatype analysis of npm supply chain attacks.

Workarounds

  • Pin dependencies to version 1.17.2 explicitly rather than using version ranges or latest tags
  • Implement Subresource Integrity (SRI) hashes for all externally-loaded JavaScript files
  • Consider self-hosting critical JavaScript dependencies rather than relying on CDN dynamic versioning
  • Migrate to the updated Prebid.js 9 workflow that does not depend on the deprecated PUC architecture
bash
# Configuration example
# Update package.json to pin safe version
npm install prebid-universal-creative@1.17.2 --save-exact

# Verify installed version
npm list prebid-universal-creative

# Generate SRI hash for self-hosted files
openssl dgst -sha384 -binary prebid-universal-creative.js | openssl base64 -A

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechPrebid

  • SeverityCRITICAL

  • CVSS Score9.3

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-506
  • Technical References
  • GitHub Security Advisory

  • Sonatype Blog Post
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English